Skip to Main Content
A-Z Index
Calendar
Campus Maps
CU Safety
Phonebook
Webcams
Services
Support
About
Cybersecurity
Research
Cybersecurity
About
Awareness & Training
Online Training
On-Site Training
Training Videos
Cybersecurity Alerts
How To
Anti-Virus Software
Avoid Text Scams
Box Secure Folders
Box Storage Guidelines
Consulting
Deleting Data
Duo Authentication
Email Best Practices
Email Encryption
Email Phishing Incident
Endpoint Security
Lost / Stolen Device
Protect Yourself
Public Wi-Fi
Quarantined Emails
Risk Management
SecurePoint Storage
Secure Your Devices
Security Guidelines
Security Incident
Secure Virtual Desktop
Traveling Internationally
Usernames & Passwords
Working Remotely
IT Policy & Standards
Acceptable Use Policy
Accounts & Passwords
BYOD Policy
Awareness Training
CCIT Disk Encryption
Electronic Mail Policy
Encryption Standards
Data Classification
Research Data Storage
Network Security
Security Standards
Security Policy
Server Administration
IT Operations Policies
Backups
Change Mgt Policy
Communication Access
Copyright Infringement
Data Center Access
File Space Provisions
IT Vendor Management
Maintenance Windows
Print Quotas
Voice Over IP (VOIP)
IT Proced. & Guidelines
AI Guidelines
BYOD FAQ
File Storage Options
Glossary of Terms
Incident Reporting
Investigation Assistance
Patching Guidelines
Strong Passwords
System/Service Owner
Operations Center
News from CCIT
Home
Cybersecurity
How To
How To
BEST PRACTICES
Avoiding Phone Text Scams
Deleting Data Before Surplus
DUO Two Factor Authentication
Email Best Practices
Protect Yourself (identity theft, scams and more)
Public WiFi Best Practices
Secure Your Device
Security Standards
Surplusing Equipment
Traveling Internationally
Usernames & Passwords
Working Remotely
STORAGE
Box Storage – Guidelines for Clemson University
Box Storage – Secure or PHI Folder Requests
File Storage Options & Solutions
SecurePoint File Storage
CYBERSECURITY SERVICES
Anti-Virus Software
Consulting
Copyright Infringement Reporting
Email Encryption
Endpoint Security
Information Security Policies & Procedures
Quarantined Emails
Risk Management Services
Secure Virtual Desktop
Training – Security Awareness
REPORTING
Email Phishing Incident
Identity Theft
Lost / Stolen Device
Security Incident