Technology alone can’t always protect our systems and information. You must remain aware of cyber threats in order to protect both yourself, the University, and the information we collect and store. Even if information security awareness training is optional, learning how to protect yourself from online threats can benefit you in your academic, professional and personal endeavors.
If you’re traveling, on campus, or at home, we believe that knowing how to protect your personal information and keep your devices secure is important. In order to uphold this idea, the Information Security Office offers both in-person training and online awareness materials for faculty, staff, and students.
If you have any questions regarding Information Security, or would like to request in-person training, contact us at email@example.com.
Are you artistic? Looking to gain experience for a career in character design? Check back here soon for an opportunity to create the face of UCF InfoSec!
The Information Security Office is looking to showcase the artistic talents of one of UCF’s students – it could be you! If you’re a lucky finalist, you will (receive/win) $100 in knights cash, and an opportunity to be our grand prize winner – the winning design will be voted for by the greater UCF community!
To be picked as a finalist, all you need to do is submit your portfolio or a collection of any previous work that you’ve already done. If your portfolio is chosen, you’ll be contacted by InfoSec to create a character to function as our department mascot, upon delivery of which you’ll be awarded the first prize of [money].
Once all the Finalists have submitted their designs, we will open the polls up to decide which design will be the new face of UCF InfoSec!
Faculty & Staff Guidelines
|Do's and Don'ts||View Page|
|Handling Restricted Data||View Page|
|High Level Security Incident Response Plan||View PDF|
|Mass Email Guidelines||View Page|
|Sharing Highly Restricted Data between UCF Units - Knowledge Base Article||Open Link|
|Procedures for Encrypting Files and Documents - Knowledge Base Article||Open Link|
|Requesting Highly Restricted Data from Third Parties - Knowledge Base Article||Open Link|