Security Tools & Documentation
One major concern for computer security is the compromise of Personally Identifiable Information (PII). When PII is discovered in a security breach, identity theft becomes a real target for cyber criminals to attack.
When security incidents are reported on campus, OIT is legally obligated to scan the compromised host for PII to identify any possible concerns. To do that, our technicians use a tool called Helix. For information on how to use Helix, see the Reference Manual.
The video below, produced by the Federal Trade Commission, addresses some important individual steps to take immediately after discovery of any data breach.