Information about reviewed software, information security best practices, and more

Articles (9)

Adding to Blocked Senders list in ProofPoint

Use Proof Point Blocked Senders list to block SPAM or any malicious e-mail messages from that sender.

Browser Incognito and Private Modes

Browsers on computers, macs, iOS, and Android have options for incognito mode.

Encrypt a USB Drive in Windows 10

Windows 10 comes with BitLocker, a tool that makes it easy to encrypt your USB drive

Information Security Standard - Vulnerability Remediation

This standard defines the required timeframe in which discovered or disclosed vulnerabilities shall be remediated.

Information Security Standard - Web Conferencing

This standard defines best practices for using web conferencing and virtual collaboration tools at TWU.

Pioneer Alert Signup Instructions: Faculty and Staff

TWU Pioneer Emergency Notification information will be used to send emergency communications about campus safety situations, evacuation, or campus closings due to inclement weather or other situations.

Pioneer Alert Signup Instructions: Students

TWU Pioneer Emergency Notification information will be used to send emergency communications about campus safety situations, evacuation, or campus closings due to inclement weather or other situations.

Redact SSN and DOB Data

In order to follow proper data security, Texas Woman's University has redaction rules that should be followed whenever Social Security Number (SSN) or Date of Birth (DOB) must be redacted. Those rules are outlined here.

Remove user from an X-Drive folder

How to remove access to a folder under X:\My Shared Folders