Keeping IU’s digital information safe

Cyber criminals look for easy pickings and prey upon weakness. IU’s IT-28 policy is designed to reduce vulnerabilities and exposure as much as possible to protect IU’s digital information.

Departments are required to submit comprehensive evaluations of their IT environments by this May — and UITS IT Community Partnerships is here to help, offering to visit and answer questions about the comprehensive evaluation.

If you manage servers or IT systems at IU and would like more information, email:

Learn more about IT-28 here >>

Tags: , , ,

<< Back

Common UITS News Tags

Start visualizing with the CIB IQ-Wall

Imagine the content of your computer screen spread across a 24 x 18 foot wall, tiled with 24 flat screen monitors.

Photo Stream

Roy Tanck's Flickr Widget requires Flash Player 9 or better.

View all UITS photos