Computing systems and the Internet have become an integral part of our daily lives and have changed the way we manage and share information, and conduct business. The proliferation of computers and powerful mobile devices, along with the various electronic communication channels available has created an environment which makes it very easy to obtain and share all kinds of information quickly and conveniently. Unfortunately, this environment has also made it easier for scammers, hackers, and identity thieves to steal your personal information. Hence, it has become very important for individuals and organizations to find ways to safeguard confidential information and keep it from falling into the wrong hands.
Information security is critically-important in the current era of computing, networking and ubiquitous access to information and resources via the Internet. Therefore, ITS is initiating the strategy of planning and creating an “Information Security Program” (ISP), which will encompass risk mitigation, philosophy and acceptance, and University policies on information security.
To aid this objective, a cross-institutional “Information Security Advisory Committee” (ISAC) has been formed to assess the current environment and take action on existing vulnerabilities, create policies, and manage the ISP and the University’s information security responsibilities.
For any inquiries, support requests, or to report an issue related to this service, please contact the ITS Help Desk. Support requests can also be submitted online at help.pace.edu (MyPace Portal username and password required). Please use the Information Technology > IT Security > General Inquiry request type (Note: Clicking this link will pre-populate the form after you log in).
Contact the ITS Help Desk
The information on these Web pages is meant to inform and educate the reader and promote ways to safeguard important information. It is everyone’s responsibility to keep information secure!
Visit the following pages:
- Computer or Mobile Device Security
- Copyright, Peer-to-Peer (P2P), and Illegal File Sharing
- Email Spam Filtering
- Good Password Practices
- Higher Education Opportunity Act Peer-to-Peer File Sharing Requirements
- Mobile Device Safe Practices
- Potential Risks with Email and Internet
- Promoting a culture of Information Security at Pace University
- Report an I.T. Security Incident
- Social Engineering
- Web Form Services and Phishing
- Wireless Security