Tag: security

Remote Vendor Support Options: Overview, Risks and Mitigation

Remote vendor support can be a valuable tool for troubleshooting and resolving technical issues. However, it also introduces potential risks if not handled securely. To assist you in utilizing remote support options while safeguarding your system, we have outlined four approaches below. Each approach is detailed in its respective section to guide you through the…Continue Reading Remote Vendor Support Options: Overview, Risks and Mitigation

Remote Vendor Support Option- Recorded Zoom Call

One reliable option for remote support is hosting a recorded Zoom call. This enables users to document vendor assistance, share screens for live troubleshooting, and provide remote access when necessary for detailed guidance. Steps: 2. Start recording as soon as the session begins. 3. After the recording is started you have the option to stop…Continue Reading Remote Vendor Support Option- Recorded Zoom Call

Remote Vendor Support Option – Recorded Teams Call

Remote vendor support plays a crucial role in ensuring efficient problem resolution and guidance without the need for physical presence. Utilizing tools like Microsoft Teams enhances collaboration, allowing users to connect with vendors seamlessly. Recorded Teams Call:One effective remote support option is hosting a recorded Microsoft Teams call. This enables users to receive step-by-step assistance,…Continue Reading Remote Vendor Support Option – Recorded Teams Call

Send Encrypted Emails in Outlook: A Complete Guide

In today’s digital landscape, protecting sensitive information is crucial, especially in email communication. Outlook’s Email Encryption feature empowers users to safeguard their confidential messages, keeping unauthorized eyes at bay. This guide explains when, why, and how to use Outlook Email Encryption to ensure your emails are secure and compliant. When Should You Use Outlook Email…Continue Reading Send Encrypted Emails in Outlook: A Complete Guide

Microsoft Authenticator

There are four common forms of second factor authentication: Using a hardware security token or an authenticator application, such as Microsoft Authenticator, provides the best security. As there are scenarios where a hardware security token cannot be used the most robust second factor to use is an authenticator application. Account security can be improved by…Continue Reading Microsoft Authenticator

How do I use Remote Desktop to remotely access campus computers

To remotely access computers on campus you must first install Open VPN and configure a connection to campus. Once a VPN connection has been established, use Remote Desktop or rdesktop to connect to a campus computer. For instructions on how to install OpenVPN and set up a profile to connect tot the S&T campus, see…Continue Reading How do I use Remote Desktop to remotely access campus computers

Code Signing Certificate Requests

Macros within Microsoft Office must be signed with a code signing certificate for security purposes. If you need to sign macros then submit a support request to IT Security. If the request is approved you will be asked to refresh your user profile by either logging out and back in or restarting your computer. You…Continue Reading Code Signing Certificate Requests

Firewall Exceptions

By default, the S&T border firewall blocks all inbound connections. Only approved services are granted an exception to this default deny. All exceptions are subject to auditing, verification and revocation. Auditing The most basic audit performed is with a vulnerability scanner. Any critical vulnerabilities will preclude an exception and all important vulnerabilities must be remediated…Continue Reading Firewall Exceptions

Isora GRC Assessments

The University is using SaltyCloud’s Isora product to handle Governance, Risk and Compliance (GRC) assessments. Notifications about these assessments come from admin@mst.isora.saltycloud.com and the assessments can be accessed at https://mst.isora.saltycloud.com. The login uses your University account through a Microsoft login page (currently login.microsoftonline.com). In order to be able to login to the system your account…Continue Reading Isora GRC Assessments

What kind of network services does S&T have?

Networking is very important, especially here at S&T. But what services does our networking team provide exactly? First off, there are many moving parts when it comes to networking. These moving parts are split up into two different categories labeled Network Infrastructure and Plant Infrastructure. Behind each name, we have a wonderful team of people…Continue Reading What kind of network services does S&T have?

Does BPM 12004 Apply to Free Software and Free Services?

Yes. Free services, applications, and software still have license agreements that have to be officially reviewed by UM’s legal team. In some cases, authorized signers might still be needed to sign an agreement. S&T IT Security must also ensure that privacy is protected and that the service, application, or software is not a security threat…Continue Reading Does BPM 12004 Apply to Free Software and Free Services?

Do I have to worry about IT taking my computer without telling me? 

Our commitment to you. As a general rule, Information Technology (IT) staff will not come and take your computer, especially without you knowing.  There are a few situations where IT may have to take your computer, but we will make every effort to inform you about the situation, recover your data if possible, and provide…Continue Reading Do I have to worry about IT taking my computer without telling me? 

FIleVault/Encryption Key Escrow

FileVault is an extra layer of login protection implemented on Jamf managed Mac computers. It does not impede everyday use of the computer. The main function of FileVault is to encrypt the startup volume of Mac computers. When a user profile is created on a Jamf managed Mac computer, FIleVault is enabled for them and…Continue Reading FIleVault/Encryption Key Escrow

I want to go back to being an admin on my Apple computer. Why can’t I go back to being an admin?

We offer a temporary admin request option that will allow users temporary ability to become admin on the computer. Due to security standard NIST 800-172, it is no longer possible to always allow full admin access. The use of JAMF has brought our Apple computer management and security more in line with the way we…Continue Reading I want to go back to being an admin on my Apple computer. Why can’t I go back to being an admin?

Why do we need JAMF?

JAMF is a new device management tool for Apple computers we have implemented to meet security standards. NIST 800-172 is a supplementary document to NIST SP 800-171, which is designed to help safeguard sensitive information on non-federal systems through best practice processes and security controls and applies to federal contractors that handle, process or store…Continue Reading Why do we need JAMF?

Making a BPM 12004 Request for Software

Making a BPM 12004 request with S&T IT will ensure that your software meets all security, compatibility, supportability, and sustainability requirements for Missouri S&T and the UM System and that legal responsibility is as removed from an individual person or a department as much as possible. You can learn more about the full process here:…Continue Reading Making a BPM 12004 Request for Software

Why Does IT Need to Review My Software?

Missouri S&T IT follows a software review process laid out by the UM System in BPM 12004. This policy ensures that IT and Telecom resources meet each campus’s security, compatibility, supportability, and sustainability requirements. When obtaining a software product (brand-new, renewal, open-source, or software maintenance), there is a lot going on behind the scenes. Legal…Continue Reading Why Does IT Need to Review My Software?

When does IT apply updates/patching/reboots to apps/desktops/services/network?

IT has a variety of defined maintenance windows and scheduled for different components of our computing environment. Some maintenance work is announced and scheduled explicitly. Others are scheduled on a recurrent basis. Different categories of updates/windows are included below for reference. Applications Applications are generally deployed during either the daily applications deployment window of 5pm-7pm,…Continue Reading When does IT apply updates/patching/reboots to apps/desktops/services/network?