Security Tools & Documentation
One major concern for computer security is the compromise of Personally Identifiable Information (PII). When PII is discovered in a security breach, identity theft becomes a real target for cyber criminals to attack.
When security incidents are reported on campus, OIT is legally obligated to scan the compromised host for PII to identify any possible concerns. To do that, our technicians use a tool called Helix. For information on how to use Helix, see the Reference Manual.