Skip Menu

Return to Skip Menu

Main Content

All Resources and Info

  • 3 Easy Steps

    Keep your operating system, antivirus software, and firewall up to date.

  • About Us

    Information about the staff.

        ITSO Location
  • Cyber Awareness

    Awareness remains one of the most effective methods of keeping your data, your computer, and even your IT systems safe.  Each person has a duty to maintain an awareness of potential threats and safe practices while computing. Learn more about cyber security issues. more info

  • Dealing with Data Exposures

    Whenever Virginia Tech is notified of a (potential) data exposure, specific steps should take place to work with university officials to determine a course of action to ensure compliance with federal and state regulations.  more info

  • Educause Security Guide

    The Information Security Guide is a compendium of information providing guidance on effective approaches to the application of information security at institutions of higher education. more info

  • Encryting Word Documents

    Microsoft Word has a built in feature allowing users to easily encrypt documents. This is available for versions 2007 and newer.

  • Find_SSNs

    Finding and protecting sensitive data can be challenging. FIND_SSNs is a tool developed to help discover sensitive data on systems. Find_SSNs searches for U.S. social security and credit card numbers. It may help individuals and organizations find sensitive numbers in files on computers. more info

  • Information Technology Risk

    An important step in the risk assessment process is identifying the risks that might occur within your department.

  • IT Security Newsletter Archive

    The IT Security Office is publishing a quarterly newsletter to discuss news and events in the world of VT IT Security. Below you will find the archives of the "IT Security Quarterly Hot Sheet". Newer items will be at the top with older items descending from there. more info

  • Phishing

    Don't get hooked. Virginia Tech will never ask for you personal information through email.

  • Policies and Standards

    Virginia Tech has many Policies and Standards related to IT.

  • Resources and Infomation

    Information about the material and resources that the IT Security Office provides.

  • Risk Assessment

    Risk assessments are an important part of protecting IT assets and information. The IT Security Office provides information and forms for conducting a STAR risk analysis. more info

  • Scanning Product Comparison

    Comparison of Scanning Products

  • Securing Mobile Technologies

    Mobile technologies such as tablets, smartphones, Google Glass, etc. have become useful tools to help carry out many of the computing task previously handled by desktop and laptop computers. Users must realize that mobile technologies need to be treated as any other computer resource. more info

  • Social Network Safety

    Who viewed your Facebook profile last night? Was it an old friend, a perspective employer, or worse.

  • Surplusing Equipment

    Properly surplusing computers and electronic storage devices helps protect Virginia Tech data from being exposed. Learn more about how to properly surplus your equipment. more info

  • Using VeraCrypt

    VeraCrypt is an open source encryption solution that is easy to use and works on Windows, Mac, and Linux.  It can be obtained by visiting and can be a useful tool to help protect Virginia Tech data.
  • Wireless Network Safety

    Many public Wi-Fi spots are not secure and users should be aware of the risk.