BitLocker-To-Go allows you to encrypt removable storage devices, like USB thumb drives,
so your data remains protected no matter where it goes. Once BitLocker-To-Go is enabled,
the removable drive cannot be accessed from another computer without first entering
the correct password that you set or by entering the drive's secret recovery key that
is generated online.
BitLocker FAQ (PDF)
BitLocker Drive Encryption is a feature first introduced by Microsoft in Windows Vista,
and helps to protect the confidential data on your computer from unauthorized access.
BitLocker helps to ensure that sensitive information is not revealed should your computer
be lost, stolen, or tampered with.
BitLocker: How to Recover from BitLocker Recovery Mode (PDF)
When BitLocker system integrity validation fails while protectors are enabled, the
operating system (OS) drive will be locked and the computer will start up in Recovery
Mode. This self-help document will step you through how to exit recovery mode.
Dell Data Protection: Securing USB Drives (PDF)
To further protect PC’s that have access to sensitive data, the Dell Data Protection
(DDP) client detects and encrypts USB/Flash drives when they are plugged into an encrypted
system. This document will step you through the process of accessing data on an encrypted
Cisco AnyConnect: Connecting to Secure and PeopleSoft Shares (PDF)
A VPN connection through Cisco AnyConnect is required to access SecureShare or PeopleSoft
network file services. This document will step you through how to connect to these
shares via Cisco AnyConnect.
Cisco AMP: Malware Analysis Software (PDF)
The Cisco AMP agent is installed on designated faculty/staff computers and can be
seen running in the system tray. Cisco AMP will monitor files on your computer as
well as files that are being downloaded to the computer.
Spirion Identity Finder: Performing a Scan (PDF)
Because data breaches are so prevalent and can be costly to the University, TU has
made Spirion Identify Finder available to all faculty and staff. Spirion Identify
Finder is a software program that scans both laptops and desktop computers for the
purpose of identifying personally identifiable information (PII).
Spirion: Setting up a Recurring Scan (PDF)
By default, Spirion is setup to only scan your hard drive, personal share drive (H:
drive) and any attached USB storage devices. If you are the sponsor of a custom or
departmental share drive, it is recommended that you run a monthly scan in order to
identify PII and move it to a secure share drive or secure shred it. This self-help
document will guide you through the steps required to setup a recurring scan.
Spirion Identity Finder: FAQ (PDF)
Spirion Identity Finder is an application that runs on Windows or Mac that can scan
for Personally Identifiable Information (PII) on your local computer or on a shared
network drive to which you have access. It also provides a way to remediate such information
once it is identified.
OpenDNS is a high-tech company that provides easy to implement Internet navigation
and web security solutions. Open DNS increases the speed of navigating websites and
prevents unintended access to phishing and malware sites.
Spam and Phishing
Spam and Phishing - Prevention Tips (PDF)
This document explains spam and phishing and will give you some tips on how to prevent
these types of unwanted email.
Using the "Report Phish" Button in Outlook (PDF)
Phishing involves the use of seemingly legitimate email messages to deceive consumers
into disclosing private information. To make it easy for TU employees to report potential
phishing attempts, a report phishing button is now available in Outlook. Clicking
this button sends the potential scam to the Office of Information Security team for
review, and deletes the email from your inbox.