Security for IT Resource Users
Welcome to the IT Resource Users Guidance page. Take a moment to consult the items below. They will help guide you in understanding the tools you have availability to you as well as your responsibilities a user of UVA IT Resources.
How to Secure Your Computer
- Requirements for Securing Electronic Devices
- Get a securely preconfigured computer: DCI program [1]
- Get Security Software
- AntiVirus: Use Microsoft Windows Defender [2] for PCs, Gatekeeper [3] for Macs, or Cylance for Linux, Mac, or Windows [4]
- Encrypt [5] files on your computer
- Secure remote access and file transfer with SecureCRT [6]
- Transfer files to/from servers using SecureFX [7]
- Delete your data safely and securely by following the Electronic Data Removal Procedures [8] guidelines. You can download the Secure Deletion Shredder for Windows using this link [9]. To securely delete information for Macs and get more information on securely deleting data on your device, follow this link [8].
- Protect your Home Computer and Network [10]
Know Your Rights and Responsibilities
- Responsible Computing at UVA for faculty and staff [11]: a handbook for UVA faculty and staff to determine what they can, cannot, and must do regarding information technology at the University.
- Responsible Computing at UVA for students [12]: a handbook for UVA students to determine what they can, cannot, and must do regarding information technology at the University.
- Information Policy [13]: Follow the link to access the full library of information policy. You can also email the Information Security team [14] for additional information or assistance navigating IT policy.
- Security Responsibilities:
- Security of Network-Connected Devices [15]: Network-connected devices [16] include all systems, whether personally or University-owned or managed, with the ability to connect to a wired or wireless network. This includes, but is not limited to, computers, laptops, desktops, servers (virtual or physical), smart phones, tablets, digital assistants, printers, copiers, network-aware devices [16] with embedded electronic systems (i.e., “Internet of things”), and supervisory control and data [17] acquisition (SCADA) and industrial control systems. Follow the link to learn more about the requirements for using these devices on a University network.
- Reporting an Information Security Incident Standard [18]
- Highly Sensitive Data Protection Standard for Individual-Use Devices or Media [19]: If you are using or storing highly sensitive data on your device, you must follow the strict regulations required for protecting this data from potential cyber-attacks. Follow the link to learn about these requirements. If you are not familiar with the definition of highly sensitive data, follow this link. [20]
Do you have a Security Problem?
- Report a Security Problem [21]
- Follow this link to view all Suspicious Emails Currently Circulating at UVa and all Security Alerts [22].