Information Technology Services

Secure Computing

Connecting your computer and other devices to a network or the Internet increases the risk of exposing your system to malware and unauthorized access by others.

Following cybersecurity best practices at home, and at work or school can help you stay safer and more secure online and better protect your personal information.

Antivirus/Malware

Multi-factor Authentication (MFA)

Internet Guardian

Secure File Transfer

Faculty/Staff Computer Administrative Privileges

Email Threats

Copyrighted Digital Media

Cybersecurity Tips and Advice

Data Classification, Storage, and Sharing

St. Cloud State has chartered a Data Classification initiative to inventory and classify data that is stored on campus systems. Data Classification establishes a foundation for identifying appropriate and consistent information security controls.

Below are the classifications and examples of data elements that fit into each category. It is important to note that those who have access to highly restricted and restricted data must ensure that it is kept secure.

After determining what type of data you will be processing, use the End User Data Storage and Sharing Recommendations to provide guidance on storing or sharing the data.

Highly Restricted

Restricted

Low

Reporting Abuse

Technology abuse refers to general abuse of St. Cloud State University’s computing resources. Examples of abuse include physical damage to computers and equipment or using St. Cloud State resources in a way that violates law or policy, such as harassing someone online or spamming from a St. Cloud State email account.

To report abuse of resources and any forms of harassment involving St. Cloud State email or technology services, please contact the IT Security Office at abuse@stcloudstate.edu.