Search17 Results

This following information outlines the criteria for identifying and designating a Federated Authorization Security Contact according to the University’s Federated Authorization Process guidelines. Each University area should designate a primary and secondary Security Contact.
Guidance for encrypting emails to users of the University of Pittsburgh’s email system, Microsoft Outlook.
Explore alternatives to the Duo Mobile smartphone app for multifactor authentication.
Key considerations and guides to help ensure your privacy and the security of University data.
Provides instructions and how-tos for setting up and using the Microsoft Authenticator app for multifactor authentication with Pitt Passport accounts.
This article provides a detailed breakdown of how to use the Qualtrics survey service in a secure manner.
This article lists the security approved, AI notetakers for use at the University.
Understand Pitt Digital's Data Loss Prevention (DLP) Framework and how it applies to different Microsoft 365 services
This article provides University buyers guidance on how to identify personally identifiable information (PII) when negotiating service agreements or issuing purchase orders for work to be performed by outside vendors.
This article details how to enable support for TLS 1.2 or 1.3 on web browsers.
This article shows you how to disable your browser's built-in password management feature to avoid confusion and enhance security after you have installed Pitt Password Manager.
Updating your browser enhances web functionality and security by patching vulnerabilities and supporting the latest technologies. Your commitment to these updates helps protect the University against emerging cyberthreats.
Unused Alumni computing accounts present a security risk. Beginning July 10, 2024, individuals who have not used their Alumni account in 180 days will receive an email explaining that their account will be deactivated in 28 days.
DMARC is a global industry email and internet security initiative.
Security consultations are helpful to understand the risks of data management, how security controls should be implemented to adhere to compliance and risk requirements, and to assist choosing the appropriate IT infrastructure for a project.