Skip to Main Content
A-Z Index Calendar Campus Maps CU Safety Phonebook Webcams
  Services  Support  About Security shield icon   Cybersecurity  Research
Cybersecurity
  • About
  • Awareness & Training
    • Online Training
    • On-Site Training
    • Training Videos
  • Cybersecurity Alerts
  • How To
    • Anti-Virus Software
    • Avoid Text Scams
    • Box Secure Folders
    • Box Storage Guidelines
    • Computer Backups
    • Consulting
    • Deleting Data
    • Duo Authentication
    • Email Encryption
    • Email Phishing Incident
    • Endpoint Security
    • Lost / Stolen Device
    • Protect Yourself
    • Public Wi-Fi
    • Risk Management
    • SecurePoint Storage
    • Secure Your Devices
    • Security Guidelines
    • Security Incident
    • Secure Virtual Desktop
    • Traveling Internationally
    • Usernames & Passwords
    • Working Remotely
  • IT Policy & Standards
    • Acceptable Use Policy
    • Accounts & Passwords
    • Awareness Training
    • CCIT Disk Encryption
    • Data Classification
    • Research Data Storage
    • Network Security
    • Security Standards
    • Security Policy
    • Server Administration
  • IT Operations Policies
    • Backups
    • Change Mgt Policy
    • Communication Access
    • Copyright Infringement
    • Data Center Access
    • File Space Provisions
    • IT Vendor Management
    • Maintenance Windows
    • Print Quotas
    • Voice Over IP (VOIP)
  • IT Proced. & Guidelines
    • Encryption Guidelines
    • File Storage Options
    • Glossary of Terms
    • Incident Reporting
    • Investigation Assistance
    • Patching Guidelines
    • Strong Passwords
    • System/Service Owner
  • Operations Center
  • News from CCIT
Home Cybersecurity How To

”TigerHow To

Three people sitting on steps outside looking at a laptop

BEST PRACTICES

  • Avoiding Phone Text Scams
  • Deleting Data Before Surplus
  • DUO Two Factor Authentication
  • Protect Yourself (identity theft, scams and more)
  • Public WiFi Best Practices
  • Secure Your Device
  • Security Standards
  • Traveling Internationally
  • Usernames & Passwords
  • Working Remotely

 

STORAGE

  • Box Storage – Guidelines for Clemson University
  • Box Storage – Secure or PHI Folder Requests
  • File Storage Options & Solutions
  • SecurePoint File Storage

CYBERSECURITY SERVICES

  • Anti-Virus Software
  • Computer Backups (CrashPlan)
  • Consulting
  • Copyright Infringement Reporting
  • Email Encryption
  • Endpoint Security & Password Management
  • Information Security Policies & Procedures
  • Risk Management Services
  • Secure Virtual Desktop
  • Training – Security Awareness


REPORTING

  • Email Phishing Incident
  • Identity Theft
  • Lost / Stolen Device
  • Security Incident
Copyright © 2023 Clemson University, Clemson, SC. All Rights Reserved. Website Technical Contact: Clemson Computing & Information Technology