Information about reviewed software, information security best practices, and more
Use Proof Point Blocked Senders list to block SPAM or any malicious e-mail messages from that sender.
Browsers on computers, macs, iOS, and Android have options for incognito mode.
Windows 10 comes with BitLocker, a tool that makes it easy to encrypt your USB drive
This standard defines the required timeframe in which discovered or disclosed vulnerabilities shall be remediated.
This standard defines best practices for using web conferencing and virtual collaboration tools at TWU.
TWU Pioneer Emergency Notification information will be used to send emergency communications about campus safety situations, evacuation, or campus closings due to inclement weather or other situations.
TWU Pioneer Emergency Notification information will be used to send emergency communications about campus safety situations, evacuation, or campus closings due to inclement weather or other situations.
In order to follow proper data security, Texas Woman's University has redaction rules that should be followed whenever Social Security Number (SSN) or Date of Birth (DOB) must be redacted. Those rules are outlined here.
How to remove access to a folder under X:\My Shared Folders