KU IT Security Services
We provide the following services to help protect the data and systems of the University and our customers:
The IT Security Office offers security consulting to help University customers understand and implement best practices in protecting data and systems.
Security protocols in grant environments, and federal regulations, such as HIPAA, FERPA and GLBA, require increasingly stringent security guidelines. IT Security Office staff can provide advice and assistance to ensure you are meeting all grant requirements, and government guidelines and regulations.
The Security Office staff will arrange time to discuss strategies and methods for securing your environment and reducing your exposure to the outside world.
Please contact the KU IT Security Office at firstname.lastname@example.org or 785-864-9003 to learn how we can assist your department in developing, planning and designing security protocols.
We all play a part in protecting our individual computers and information, as well as University systems and data. User education and awareness training is one of the best ways to keep us all safer.
IT Security Awareness Training via KU's Talent Development System
All KU faculty and staff are required to annually complete the IT Security Awareness Training Course » in KU's Talent Development System.
Take the course: IT Security Awareness Training Course »
IT Security Awareness Presentations for Groups and Departments
The KU IT Security Office also provides in-person security awareness trainings and presentations for KU groups and departments. To schedule a security training or presentation complete our online form, or contact us at email@example.com or 785-864-9003.
Firewalls provide protection against outside attackers by shielding your computer or network from malicious or unnecessary Internet traffic. Firewalls can be configured to block data from certain locations while allowing the relevant and necessary data through. Firewalls also are used to compartmentalize internal systems with HIPPAA, PCI and other Level 1 data from systems that may not have the same level of sensitivity and/or security requirements.
IT Security Office offers firewall management and design for the University community to ensure firewalls are deployed according to industry standards and best practices. The Firewall Management service is available to KU system administrators, faculty and staff.
See Firewall Management for more information.
Email Encryption and Digital Signatures
Digital credentials are available for all current KU faculty, staff and student staff. KU uses DigiCert certificates for email signing and encryption. Because the DigiCert root is widely distributed, you can digitally sign email to anyone—on or off campus—with no special setup required by the recipient. For more information about Email Encryption and Digital Signatures, see Email Security.
To get your digital certificates for email encryption and digital signing, and to learn more about email security at KU, visit Email - Security/Encryption.
Whole Disk Encryption
Whole Disk Encryption means encrypting the hard drive of a computer, so the data is accessible only by the decryption key holder. For more information, see Encryption.
The KU IT Security Office offers Whole Disk Encryption services for KU workstations. For more information about Whole Disk Encryption services, complete our online form, or contact us at firstname.lastname@example.org or 785-864-9003.
Antivirus software detects and removes malicious software on your computer. Up-to-date antivirus is an essential component of technology security on all your devices, including computers, smartphones and tablets.
See Antivirus Software for more information.
KU IT installs Sophos antivirus on all KU-owned workstations. Sophos provides a free version that faculty, staff and students can download for home use.
KU IT’s eWaste service provides a way for KU departments to securely and responsibly recycle obsolete, unused or unwanted electronic equipment and data storage devices. All sensitive and proprietary University or customer information is completely removed from computer and storage devices before disposing of them in an environmentally safe manner. All KU campus departments should use this service for KU-owned and/or operated equipment.
See eWaste Recycling for more information.
Research Security Support
Many KU researchers engage in research that involves the collection or use of identifiable private information. Federal law and KU policy provide specific guidance for protecting identifiable research information.
The IT Research Support Team and KU Information Technology, in partnership with the Office of Research, offer specialized services to meet the needs of KU researchers, including security-related support, Research File Storage, access to the Advanced Computing Facility, and research websites.
See Research Security Support for more information.