Get Help

Online: Request Help
Phone: (707) 826-4357 • Hours
Email: help@humboldt.edu
Walk-In: Library 101 • Hours
Reset HSU Password
System Status

Search

Search results

  1. Wireless :: Your Wireless Options at HSU

    ... 802.11g compatible network card that supports WPA2 encryption (802.11n is recommended). Network Names - ...

    Page - Anonymous - Aug 22 2016 - 16:48

  2. Data Protection

    ... this task. Security Encryption Data Protection Security Please ... can be taken to protect it. This will usually involve encryption , and should only be undertaken by experienced technical personnel; ...

    ITS Service - bjt7001 - Aug 10 2016 - 13:16

  3. Wireless Connectivity (Staff/Faculty/Students)

    ... network. While HSU has adopted Gmail , which uses SSL encryption , as the campus standard email system, other email systems may not ... compatible network card that supports WPA2 encryption (802.11n is recommended). Network Names - ...

    ITS Service - bjt7001 - Aug 10 2016 - 09:35

  4. Virtual Private Networks (VPNs)

    ... authentication to deny access to unauthorized users, and encryption to prevent unauthorized users from reading the data being ...

    ITS Service - bjt7001 - Aug 10 2016 - 08:55

  5. Frequently Asked Questions - Security :: Online Storage and Email

    ... unless it has been encrypted using HSU approved strong encryption .  Read the full answer   Q:  How do I share ... that data has been encrypted using HSU approved strong encryption . Alternatively, you can store the sensitive data in a system ...

    Page - Anonymous - May 11 2016 - 09:44

  6. Forms

    ... Level 2 Data Storage Authorization HSU Procedure: Encryption Support Instructions Security Incident Reporting ...

    Page - bjt7001 - May 5 2016 - 16:00

  7. Wireless :: Regular Wireless Access Overview

    ... network. While HSU has adopted GMail , which uses SSL encryption , as the campus standard email system, other email systems may not ... You can usually tell if a web site is using SSL encryption by the presence of a "lock" icon in the lower right-hand corner of ...

    Page - rrw1 - Feb 9 2016 - 13:24

  8. Security :: Tools and Resources

    ... in hardware, software, or a combination of both. Encryption . Encryption converts data into a secure form that can be safely moved around ...

    Page - bjt7001 - Jan 26 2016 - 16:42

  9. Security :: Secure Disposal of Paper & Electronic Media

    ... When the drive is ready for retirement, simply delete the encryption key which leaves the drive inaccessible. Labeling Wiped ...

    Page - Anonymous - Jan 11 2016 - 15:05

  10. Mobile Device Security

    ... for connecting to HSU's wireless network. 5. Use an encryption solution to keep portable data secure in transit. Data ... stored using a mobile device, make sure you first install an encryption solution. Note that confidential HSU data may not be stored on a ...

    Page - Anonymous - Jan 11 2016 - 14:20

Pages