Educause Security Discussion mailing list archives

Re: Compromised Accounts Procedures


From: Rick Lesniak <lesniak () BUFFALO EDU>
Date: Wed, 23 May 2012 13:39:59 -0400

Bob,

Here's our Policy and procedure for Securing Network Connected Devices
(downloads as a PDF):
http://policy.business.buffalo.edu/Policy%20Library/Securing%20Network%20Con
nected%20Devices.aspx

Cheers,
   Rick
-- 
Rick Lesniak
IT Policy and Communications Officer
SUNY University at Buffalo

From:  Robert Meyers <remeyers () MAIL WVU EDU>
Reply-To:  The EDUCAUSE Security Constituent Group Listserv
<SECURITY () LISTSERV EDUCAUSE EDU>
Date:  Wednesday, May 23, 2012 12:29 PM
To:  <SECURITY () LISTSERV EDUCAUSE EDU>
Subject:  [SECURITY] Compromised Accounts Procedures

Does anyone have a documented process, guidelines, or procedures taken when a
user reports a compromised account? We are looking to create such
documentation in order to establish consistency in our trouble ticket handling
of such cases.
 
Thanks in advance!
 
Bob
 
 
 
 
Robert E. Meyers,  Ms.Ed.
Manager, Security Awareness
  Information Security Services
West Virginia University
office: (304) 293-8502
remeyers () mail wvu edu





Current thread: