In this section of our site, you will find general information to assist you in keeping an eye toward security issues as you navigate your daily IT landscape.  These pages will provide more in-depth information than our FAQ page, and if there are other topics you'd like to see covered here, please leave a comment for us and we'll look into adding them.

There are several University policies that touch upon issues regularly handled by SOS.  Find links to those policies here, along with links to related resources.

Reporting an Incident
Even if you're careful, you follow best practices, and your IT staff see you as a shining example of how computing resources should be used, problems happen.  When you need to report something to SOS, this section will tell you how to report it properly.

Data Categorization
Note: Data Categorization is now an official University policy.

Security Design Review
Note: The Security Design Review (SDR) document is a DRAFT of an upcoming initiative SOS is undertaking.

Phishing Information
Was that email message legitimate?  Was that really a Penn State log-in page?  Look here for information on how to spot and avoid phishing scams, plus what you should do if you were successfully phished.

Mobile Computing Safety
Laptops, notebooks, tablets, jump drives, Internet cafés, open wireless networks, and more.  Your security may be at risk more often than you think.  Check here for information on how to keep your IT assets secure when you wander away from the safety of your office, home, or cave.

Account and Passphrase Security
Passwords?  Those are so 20th century.  Learn how to create and manage passphrases that will go a long way in keeping your accounts safe.

Find out what you need to know in order to stay within the law, but also how the law protects you.

Spam Information
You have better things to do than sort through a bunch of unwanted messages.  Check this section out for strategies on how to minimize spam's impact on your in-box.

Securing Your Devices
The best offense is a good defense, right?  Follow these tips to be proactive in keeping threats to your devices at bay.

Security Tools
Programs and utilities you can employ to make your computing experience more secure.

All the things that didn't fit into the other categories, but helpful stuff, nonetheless.