Security assessment, education, and awareness of campus security requirements, policies, and guidelines. Includes contract reviews and risk assessments.

Articles (7)

Data Classification Levels

Describes the levels of secure data.

Email Security for Vendor Application

Service Owners are employees who work with a vendor (outside of our company) that sends email on behalf of our university, using one of our domains. Examples of departments that may have Service Owners include marketing, admissions, and IT.

Protect Yourself from Email Scams

Outlines how to protect yourself from email scams.

SaaS Best Security Practices

This article summarizes key security risks associated with SaaS applications and provides best practices to mitigate them. Topics include provider vetting, MFA, least‑privilege access, encryption, monitoring, and user education to help protect Drexel data.

Student Job Posting Scams

Details how to recognize and avoid scams as well as recover if you were scammed.

Desktop Software Best Security Practices

This article highlights common security risks associated with desktop software, such as outdated software, malware, misconfiguration, and data breaches, and provides best practices to reduce those risks. Guidance includes using trusted sources, keeping software updated, enforcing strong authentication, encrypting and backing up data, using Drexel‑approved security tools, and reporting suspicious activity.