Get Help

Online: Request Help
Phone: (707) 826-4357 • Hours
Email: help@humboldt [dot] edu
Walk-In: Library 101 • Hours
Reset HSU Password
System Status

Services For

Data Protection

Security :: Macintosh OS X Encryption

Before proceeding, seek the support of your ITC.

Do not encrypt the only copy of protected data. Mobile devices have a greater exposure to damaging environments, and data on these devices, encrypted or not, can suddenly become unrecoverable.

Encrypting your home folder with FileVault

You can turn on FileVault to encrypt the information in your home folder. Encryption scrambles the data in your home folder so that unauthorized users, applications, or utilities can’t access your data.

Security :: BitLocker Encryption for Windows 7/Windows 8/Windows Server 2012

BitLocker is included with Windows 7/Windows 8/Windows Server 2012 and provides Full Volume Encryption. By encrypting the entire hard drive, the operating system can provide a much higher level of security against offline attacks. BitLocker uses HSU's Active Directory to store keys and help manage data protection.

Security :: Encryption

Encryption is the transformation of data into a form unreadable by anyone without the secret decryption key. Its purpose is to ensure confidentiality and privacy by keeping the information hidden from anyone for whom it is not intended. When an entire hard drive is encrypted, all the data on the drive is protected from unauthorized access if the computer is lost or stolen. Encryption can also be used to protect sensitive files that are sent through email or sensitive communications sent over the network.

Security :: Data Classification Standards


Classification Description Examples

Level 1:



Security :: Virus Protection

Computer viruses used to be very obvious - you'd know that your computer was infected because threatening messages would appear on your screen, or applications stopped working. Today's malware instead tries to be as secretive as possible - the goal is to get onto your machine and start stealing valuable information, not to show off programming tricks. Many of today's attacks come wrapped in a cloak of pseudo-legitimacy, appearing as a message or request for information from an official source, such as your bank, eBay, even the Humboldt State University Technology Help Desk.

Security :: Using Hardware to Boost Software Security

The best way to protect personally identifiable or other confidential information stored on a computer is to encrypt it. However, encryption can negatively impact computer performance and make some applications harder to use, so it is sometimes necessary to use encryption less and instead add an element of hardware configuration into the mix to keep systems running at an optimal level.

Here are some of the ways hardware configurations may be combined with software tools to create a balance between security and usability.