Offerings that provide a secure computing environment for end users. Includes network security, system security, application security, and threat monitoring and management.

Articles (21)

1Password - Creating, Sharing, and Managing Vaults

This article outlines how to organize and securely share sensitive information using Personal and Shared Vaults within your 1Password TAMU account. It details the creation, sharing, and access management processes for both vault types, ensuring that personal data remains private and shared resources are appropriately accessible to authorized users.

Duo - YubiKeys and Duo Hardware Tokens

How to use YubiKeys and Duo hardware tokens as additional methods for two-factor authentication (2FA) with Duo Security.

Email - Spoofing and Imposters

An overview of email spoofing and how attackers use impersonation techniques to deceive recipients into believing emails are from legitimate sources.

Malware Blocking

Texas A&M University (TAMU) takes a proactive approach to safeguard its information resources from malware threats. The university has implemented comprehensive policies, technologies, and educational efforts to mitigate the risk of malware infections and ensure a secure computing environment.

Tips for Creating Passwords

Best practices for creating strong, secure passwords.