Information Security is not just about securing information from unauthorized access. It includes processes and methods to prevent unauthorized access, use, disclosure, disrupt, modify, inspect, record or destroy information, both physical and electronic.
Yes, we have a Twitter account now: UofRedlands_ISO
As a way to promote our new Twitter account as well as our Tech Summit (see info below), we are giving away two vouchers for CompTIA's Pentest exam to 2 winners, picked at random, that do all of the the following by Sept 15th:
Feel free to send us an email with any questions regarding this promotion: InfoSec@redlands.edu
The vision of this Summit is to educate everyone by continuing the discussion of information technology drivers in this ever-changing landscape. Join us for our first Tech Summit to learn about the latest in technology, data management, and cyber security as well as an opportunity to network with your peersSchedule of Events
Security Awareness & Prevention Programs from Public Safety
Helpful links to help you with everything from setting up your first computer to understanding the nuances of emerging threats.
Information and IT Security News, expert insights and analysis