Take Action Today!

 

Spotlight

Spotlight

Spotlight

Spotlight

Spotlight

Spotlight

Spotlight

Spotlight

Spotlight

ASU Information Security Office

The Information Security Office, under the authority of the Chief Information Security Officer, is the department with primary oversight for information security at Arizona State University. The Information Security Office (ISO) conducts its activities using the Information Security Program cycle for continuous improvement of ASU's information security posture and collaborates with internal departments/units and external agencies as necessary.

Security Advisories

  • US-CERT Current Activity:
    The US-CERT Current Activity web page is a regularly updated summary of the most frequent, high-impact types of security incidents currently being reported to the US-CERT.
    http://www.us-cert.gov/ncas/current-activity/
  • Internet Crime Complaint Center (IC3):
    The Internet Crime Complaint Center (IC3) is an alliance between the National White Collar Crime Center (NW3C) and the Federal Bureau of Investigation (FBI). IC3’s mission is to address crime committed over the Internet.
    http://www.ic3.gov/media/default.aspx
  • Microsoft Security Bulletins:
    Microsoft security bulletins provide information & news about computer vulnerabilities and security updates to keep your computer protected.
    http://technet.microsoft.com/en-US/security/dn481339
  • Apple Security Updates:
    This document outlines security updates for Apple products.
    http://support.apple.com/kb/ht1222
  • Oracle Critical Patch Updates, Security Alerts and Third Party Bulletin:
    This page lists announcements of security fixes made in Critical Patch Update Advisories and Security Alerts, and it is updated when new Critical Patch Update Advisories and Security Alerts are released.
    http://www.oracle.com/technetwork/topics/security/alerts-086861.html

Protecting Against Phishing

What is Phishing?

Phishing, in a nutshell, is the online version of a con-job. The perpertrators of phishing messages are essentially tech-savvy con-artists. In a phishing scam, these con-artists send out messages and emails that "look" legitimate, hoping to trick the unsuspecting user into giving out their personal information, including usernames and passwords, and allowing the perpertrator to conduct identity theft.

OpenSSL "Heartbleed" vulnerability

Security alert – Action needed to protect vulnerable systems running OpenSSL.

This note is a call to action for all departments who provide university services with systems running OpenSSL. 

Professor shares top 10 tips for protecting online personal info

Please read this article for some tips on data privacy published by W. P. Carey School of Business associate professor Marilyn Prosch.

https://asunews.asu.edu/20110606_business_onlineprivacy