IT Security

The scope of IT Security efforts is to protect the confidentiality, integrity and availability of digital resources at S&T. But we cannot do this without your help. How can you help?

Security is an approach and mindset, not a fixed set of rules. However, some rules can help provide guidance on how to approach certain situations. We have divided this into the following areas, but these distinctions are not always clear cut and some topics are covered multiple times from different points of view.


These articles provide information about cybersecurity issues such as identity theft, key logging and Phishing. If you are looking for security topics this is a good place to start.


Best Practices

This section describes approaches to practicing effective security when utilizing resources such as computers and password management. If you are looking for "do's" then this is a good place to find them.