Mobile technologies such as tablets, smartphones, Google Glass, etc. have become useful tools to help carry out many of the computing task previously handled by desktop and laptop computers. Users must realize that mobile technologies need to be treated as any other computer resource. more info
Protecting sensitive data is an important issue at Virginia Tech. It is imperative to be aware of what types of data you handle and if it is sensitive. Once found, it is just as important to take steps to protect it. Virginia Tech has many policies and standards in place dealing with and protecting sensitive data. It is our shared responsibility to do what we can to protect sensitive information. more info
Finding and protecting sensitive data can be challenging. FIND_SSNs is a tool developed to help discover sensitive data on systems. Find_SSNs searches for U.S. social security and credit card numbers. It may help individuals and organizations find sensitive numbers in files on computers. more info
Virginia Tech has many Policies and Standards related to IT.
The IT Security Office is publishing a quarterly newsletter to discuss news and events in the world of VT IT Security. Below you will find the archives of the "IT Security Quarterly Hot Sheet". Newer items will be at the top with older items descending from there. more info
TrueCrypt is an open source encryption solution that is easy to use and works on Windows, Mac, and Linux. It can be obtained by visiting www.truecrypt.org and can be a useful tool to help protect Virginia Tech data.
Awareness remains one of the most effective methods of keeping your data, your computer, and even your IT systems safe. Each person has a duty to maintain an awareness of potential threats and safe practices while computing. Learn more about cyber security issues. more info
Properly surplusing computers and electronic storage devices helps protect Virginia Tech data from being exposed. Learn more about how to properly surplus your equipment. more info
Risk assessments are an important part of protecting IT assets and information. The IT Security Office provides information and forms for conducting a STAR risk analysis. more info