Search This Site


Main menu


A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

View All


vishing: is making phone calls or leaving voice messages claiming to be from a reputable company or colleague in order to get you to reveal personal information, such as bank details and credit card numbers or passwords.  It's a combination of ‘voice’ and ‘phishing,’


Vulnerability is a weakness in an application, computing system, or network which can be exploited to perform unauthorized actions.

Vulnerability detection software

Vulnerability detection software is a service that scans an endpoint for current patch levels against a centralized database for known operating system and application vulnerabilities.

Report an Information
Security Incident

Please report any level of incident, no matter how small. The Information
Security office will evaluate the report and provide a full investigation if appropriate.

Complete Report Form