Get Help

Online: Request Help
Phone: (707) 826-4357 • Hours
Email: help@humboldt [dot] edu
Walk-In: Library 120 • Hours
Reset HSU Password
System Status

Services For


Security :: Password Manager Software

While we're always encouraging you to use strong passwords, and you already know you should use different passwords for different sites to protect your personally-identifiable information, we recognize that it's challenging to remember multiple password-user name combinations and what goes with which site. So, we've done some research and come up with a list of password manager applications we feel comfortable recommending to securely store all your passwords in a single location, which is much safer and more efficient than Post-It notes, browser caches, or Word documents.

Security :: Tools and Resources


HSU's information security infrastructure comprises the tools and equipment the campus employs to protect University-owned computers and networks. This infrastructure is designed to be as unobtrusive as possible while still maintaining a high degree of protection against malware, hackers, and data breaches:

Security :: Information Security Incidents

As technology gets more complex and more personal information is (accidentally or deliberately) shared, information security incidents happen more and more frequently, and even the largest organizations are not immune.

Security :: Information Security Basics

Humboldt State University's Information Security Team collaborates with faculty, staff and students to keep campus computing systems running smoothly and important data protected and secure.

Information Security Organization

Information Security Plan. Secure data and infrastructure protecting confidentiality, availability and integrity.

Policy :: Confidentiality

All HSU employees (including student employees, contractors, and consultants), faculty, and Unit 4 employees are required to have a signed confidentiality statement form on file with Human Resources. The information provided, together with the role you have at the University, dictates the data and applications you are authorized to access under the CSU Data Classification Standards.

Click on the appropriate link below to access the procedure for submitting the form:

Security :: Breaches of Information Security

Data security breaches are happening more and more often, and even the largest organizations are not immune. Many well-known banks, manufacturing companies, government departments, universities, and other organizations have experienced major breaches in data protection. It's important to remember that data breaches aren't just caused by sophisticated hackers; they're also caused all-too-frequently by a lack of attention or care being paid to the information entrusted to us - in fact, the biggest threat to data security is people's behavior.