Computer & Device Security

  • What should I do if my files or browser are suddenly locked?

    Ransomware is an especially dangerous form of malware. If you receive a notification that you must pay a certain amount of money to use your computer, access files or more, you may be infected with ransomware. Some ransomware will encrypt your files ...

  • What are computer operating system updates? Why do I need them?

    Apple and Microsoft frequently release updates for their Operating Systems. You must keep your computer current with these updates to protect against vulnerabilities. Many viruses and worms spread rapidly because this essential task is overlooked or ...

  • How do I request a change to the firewall?

    To request a firewall rule to be put in place, use the Firewall rule request form.

  • How do I protect my computer from malware?

    Malware is malicious software that gets installed on yourcomputer. Malware programs:Gather information about your web browsing habits and pass the information on to advertisers.Cause severe damage to your system, such as pop-up advertisements, viruse...

  • How can I lock my computer?

    It is very important to lock your computer any time that you step away from it. Doing so is an easy and effective way to protect the information on your computer system while it's unattended. When you lock your computer, you safeguard your data witho...

  • How do I protect my Windows computer when using Internet Explorer (IE)?

    C&IT recommends Mozilla Firefox and Google Chrome web browsers. If you need to use Internet Explorer for a specific application, protect your computer with the security precautions below. 1. Open up a session of Internet Explorer. 2. Click Tools...

  • How often do I need to back up the data on my computer?

    Backing up your data is one of the most important steps you can perform inpracticing safe computing. Unfortunately, this step is often overlooked. Ifyour computer hard drive malfunctions or if your computer gets compromised bya virus or hacker, the p...

  • What are Microsoft Office updates? Why do I need them?

    Microsoft Office has been -- and still is -- a target for hackers and viruses because of its security vulnerabilities. To combat this, Microsoft is continuously working to fix these vulnerabilities by offering updates, patches and service packs. Thes...

  • What is a firewall? Why do I need one for my computer?

    A firewall is a protective barrier that prevents unwanted sources such asviruses, worms, trojans and other malicious code from accessing your computeror network. Firewalls can be either hardware-based or software-based. Thesetwo types of solutions ca...

  • How do I securely encrypt a USB flash drive using a Mac?

    Encrypting a portable USB flash drive is a great way to prevent sensitive data falling into the wrong hands, preventing data breaches and security incidents. This guide will demonstrate how to securely encrypt a USB flash drive within macOS so that t...

  • How do I securely encrypt a USB flash drive using Windows?

    Encrypting a portable USB flash drive is a great way to prevent sensitive data falling into the wrong hands via data breaches and security incidents. This guide will demonstrate how to securely encrypt a USB flash drive within Windows so that the dat...

  • What security settings are available on my Android mobile device?

    Android runs on the majority of smartphones across the globe. Due to its popularity, it is also the most targeted. Here are some tips to keep your Android device secure. However, please keep in mind that your Android device may differ slightly, as ev...

  • What security settings are available for my iOS mobile device?

    iOS is Apple's popular mobile operating system that runs on the iPhone and iPad. Here are some tips to keep your iOS device secure. However, please keep in mind that your iOS device may differ slightly, as previous generations of hardware may not be ...

  • What is a digital signature and how do I use one?

    A digital signature is a convenient method of signing documents electronically. Digital signatures can accomplish this in several ways, but are most commonly done using certificates that use a non-reversible mathematical algorithm.

  • How can I protect my computer with antivirus software?

    One of the most important ways you can protect your personal computer (PC) is to download antivirus software and run regular scans. While no antivirus is 100 percent foolproof, there are now many free and often operating system-integrated products th...

  • How can I keep my mobile device safe?

    As mobile devices have become increasingly important in our everyday lives, they have also become a primary target of thieves and hackers. Follow these easy tips below to keep your device and your information safe. Built-in security featuresLock your...

  • How do I encrypt common Microsoft Office documents?

    You may have sensitive data in Microsoft Office documents that you would like to have extra protection for. While you may be storing these documents in a secured location (such as a network drive), they may still be vulnerable to attack and disclosur...

  • How do I encrypt individual files?

    You may have sensitive data in your files and/or documents that you would like to encrypt for extra security. While you may be storing your files in a secured location (such as a network drive), they may still be vulnerable to attack and disclosure i...

Policies, Standards, Guidelines

Security Awareness

  • What services does the Information Security Office offer?

    Incident response The Information Security Office is responsible for managing any reported IT security incident, whether it is a policy violation, large data breach, or a suspected phishing email. Please see this page on how to report an incident to ...

  • What IT security actions can I take myself?

    Keeping your computer secure is necessary whether you are at work or at home. Follow this advice to stay safe and minimize your chances of getting hacked. Always hover, every time This title may sound funny, but it is important to remember to hover y...

  • How do I report a security incident?

    Timely reporting of any suspected IT security incidents keeps the University secure. Please see below on how to best contact the Information Security Office when reporting a security incident: Reporting a data breach In the event of a system breach o...

  • What is Wayne State's Information Security Office?

    Wayne State University Information Security Office The Information Security Office (ISO) is a part of the division of Computing & Information Technology at Wayne State University. This team is responsible for network and application security acro...

  • What should I know about the C&IT Security Awareness Program?

    C&IT is working with SANS to increase Wayne State University employee IT security awareness and knowledge, and to help maintain the privacy and security of university and personal data.

  • How do I report phishing messages or suspicious emails?

    Wayne Connect has a powerful filter that prevents many malicious emails from reaching your inbox. Some messages do get past these filters, so if you receive a phishing email, follow the steps below:Report a message using Outlook in your web browser1....

  • What is a data breach?

    A data breach occurs when sensitive, protected or confidential information has potentially been viewed, stolen or used by an unauthorized individual. Data breaches may involve personal health information, personally identifiable information or intell...

  • How do I create or change a password for the user account on my computer?

    Windows Users of any University-owned machines are required to change their passwords on a regular basis. You are responsible for the security of your computer. (For personal computers, learn how to change your password manually at support.windows.co...

  • Where can I find guidelines for creating a secure password?

    A secure password may be the only line of defense your computer possesses. If you have a weak password, a hacker may easily crack it and gain access to all the information that resides on your computer. This is just one of the reasons Wayne State Uni...

  • Where can I find information about legislation regarding IT security and data privacy?

    The following is a non-exhaustive list of official government or national association websites (as of December 2014) that deal with federal and state legislation regarding IT security and data privacy. Family Educational Rights and Privacy Act (FERPA...

  • What is Security Access Management?

    Security Access Management administers connection to Enterprise Applications such as Banner, Xtender/Imaging, Cognos, ODS, Workflow and STARS. A Wayne State University AccessID is required to access Enterprise Applications.Visit the Enterprise Applic...

  • What do I need to know about legal and illegal downloads?

    Don't share content illegally The United States Copyright law (1967), the Digital Millennium Copyright Act (1998) and the Higher Education Opportunity Act (HEOA) (2009) state that distributing copyrighted material to which you do not own the copyrigh...

  • As a department, what do I have to be concerned about when somebody leaves or transfers out?

    When human resources paperwork is processed and an employee is terminatedfrom Wayne State University, there is an automatic process to remove theBanner, Application Xtender, Cognos, WayneBuy and any direct Oracle accessthat exists to a Banner and Ope...

  • Where can I get up-to-date, trustworthy security information?

    Cyber security Check out these resources to learn more about cyber security and get the latest news to protect yourself: Security news on tech.wayne.edu IT security Check out these resources to get the latest IT security information. SANS Newsletters...

Two Factor Authentication

  • How do I use Two Factor Authentication without a phone?

    The C&IT Help Desk sells the YubiKey 4, a USB authentication key that may be used in lieu of a push notification or pin number to satisfy Two-Factor Authentication. The authentication key is designed to stay plugged in to a user's computer and pr...

  • How do I set up Duo Mobile push notifications?

    Connecting to the Wayne State VPN requires users to authenticate their login using the Duo Two-Factor Authentication Mobile app. Using other methods such as text message or phone call confirmation will not work at this time.

  • FAQs about Duo Two-Factor Authentication

    Common questions and answers about using Duo with Wayne State systems.

  • How do I setup and use Two-Factor Authentication?

    Two-factor authentication adds a second layer of security to your online accounts. Verifying your identity using a second factor (like your phone or other mobile device) prevents someone other than you logging in with your credentials. Two-factor ref...

  • How do I SSH using Two-Factor Authentication?

    As part of C&IT's continued efforts to protect critical campus resources, two-factor authentication is required for Secure Shell (SSH) logins on our production Linux servers. Two-factor authentication for SSH is operated via the same system as al...

  • How do I manage my Two Factor Authentication in Academica?

    Two Factor Authentication offers a second layer of security when accessing secure services. Two Factor Authentication devices and methods may be managed at any time through Account Management in Academica. In Account Management, you may manage device...

WSU Virtual Private Network

  • What is the WSU VPN?

    The Wayne State University Virtual Private Network allows access to WSU resources that are blocked by a firewall.

  • How can IT staff access the Pulse Secure VPN?

    The Pulse Secure VPN is reserved for IT professionals.

  • How do I install and connect to the PaloAlto GlobalProtect VPN?

    Follow the steps below to install and connect to the PaloAlto GlobalProtect VPN on your computer running Windows 10 or macOS 10.10+. If you are using a laptop with ChromeOS, follow the steps at tech.wayne.edu/kb/security/wsu-virtual-private-network/5...

  • FAQs about GlobalProtect VPN

    Review this entire FAQ to determine whether you need to use the VPN

  • Who can use the VPN?

    Only Wayne State University students, faculty, and staff may use the VPN (Virtual Private Network). A WSU AccessID and password is required to log in. Learn more about the WSU VPN at https://tech.wayne.edu/kb/security/security/682.

  • GlobalProtect stuck at connecting stage on MacOS

    There is a known issue on macOS devices when installing GlobalProtect. If your device is stuck in the Connecting phase, please follow these steps to resolve this issue.

  • How do I install PaloAlto GlobalProtect on ChromeOS?

    ChromeOS users will need to follow the steps below to install PaloAlto Global Protect:You must have your Duo Two-Factor settings configured to receive push notifications through Duo Mobile. Find those steps at tech.wayne.edu/kb/security/two-factor-au...

  • FAQs about Remote Desktop (RDP)

    Many Wayne State employees are trying to use this technology.  Please read this FAQ list carefully ... because you may not need to use RDP, and that will save you precious time and energy.