Request a Security Consultation

Description

Security Consultation to facilitate security best practices for business use cases or for risk assessment and data security considerations.

Standard Services and Features 

  • Consultation to determine the best practices for handling sensitive data in the context of data at rest, in transit, or data storage options.
  • Risk Assessment – A consultation to determine any unique security recommendations or requirements for systems, data or business practices.
  • Controlled Research Data Security – A consultation to determine the appropriation and data security plan for Controlled Research Data.
  • Software/Service Purchase Consultation – A consultation or requested review of software or service in regards to security requirements and integration considerations.
  • If you host a web site or application under an indstate.edu sub-domain, you may request a certificate to secure traffic to your web server.
  • Miscellaneous data security related consultation requests.

SLA:  You can expect this service to be completed in 3 business days.

Constraints/Scope 

Faculty, staff, and students

Directions

Please indicate the nature of your consultation or service request with as much detail as possible.

 

 
Request Consultation

Related Articles (3)

The Indiana State University Data Classification and Data Storage Quick Guide outlines the policies and procedures for classifying, storing and handling institutional data at Indiana State University (ISU). The guidelines emphasize the importance of data security and the responsibilities of ISU community members in safeguarding institutional data.
This article outlines the descriptions, permissions, and associated functionalities related to ISU data sensitivity labels, including Public Data, University Internal Data, Restricted Data, and Highly Restricted Data. By adhering to these guidelines, the university aims to enhance data security and management, ensuring that sensitive information is appropriately protected and accessible only to authorized individuals.
Indiana State University emphasizes the shared responsibility of its campus community in maintaining digital security by being vigilant against social engineering tactics such as phishing, impersonation, and urgency-based scams. The university encourages the use of multifactor authentication, strong passwords, cautious handling of unexpected requests and suspicious links, prompt reporting of suspicious emails, and immediate notification to the Help Desk if accounts are suspected to be compromise