SSH Newsletter (Security & Shared Hosting Newsletter) – Winter 2013
How should I handle restricted data?
Restricted data is often stored in electronic format, which can make it more vulnerable to exposure. Because of this the need to protect personally identifiable information has never been greater. Each individual who creates, handles, stores, transfers or destroys data must comply with these secure data handling best practices.
Building a three-legged stool
Using defined methodologies is integral part of successfully supporting the technology needs of campus and UW System. Without a holistic approach, we risk meeting our goals, expectations and deadlines. Learn how the development lifecycle incorporates security for a balanced and successful project.
Phish come in many varieties
When you hear the term "phishing," you most likely think about an email message from a seemingly legitimate source asking you to click on a link or provide sensitive information. A number of other technologies and media are also used Learn about one type of scam and how to protect yourself.
New Windows and Linux restricted data handling servers
DoIT's Shared Web Hosting service is pleased to announce that a new Windows 2012 IIS 8 and Linux RedHat 6 LAMP platform servers are in the works. These servers will help reduce some of the burden in securing the restricted data from potential security risks. Learn more about the servers and when they will be available.
Need group access control?
Manifest can help.
Manifest is an easy-to-use tool that allows users to control access to resources and to grant NetIDs to University affiliates. Learn more about Manifest and how to get started. The Shared Hosting Service will help you configure your site for use with Manifest via Shibboleth.
|