Security assessment, education, and awareness of campus security requirements, policies, and guidelines. Includes contract reviews and risk assessments.
Describes the levels of secure data.
Service Owners are employees who work with a vendor (outside of our company) that sends email on behalf of our university, using one of our domains. Examples of departments that may have Service Owners include marketing, admissions, and IT.
Outlines how to protect yourself from email scams.
This article summarizes key security risks associated with SaaS applications and provides best practices to mitigate them. Topics include provider vetting, MFA, least‑privilege access, encryption, monitoring, and user education to help protect Drexel data.
Details how to recognize and avoid scams as well as recover if you were scammed.
This article highlights common security risks associated with desktop software, such as outdated software, malware, misconfiguration, and data breaches, and provides best practices to reduce those risks. Guidance includes using trusted sources, keeping software updated, enforcing strong authentication, encrypting and backing up data, using Drexel‑approved security tools, and reporting suspicious activity.