Search
Log In
HOME
PENN STATE IT
EDUCATION & TRAINING
What to Do in Case of a Security Incident
How to Protect Your Devices, Data, and Account
Anti-Virus Software
Awareness Training
Backing Up Your Data
Block a Sender in Outlook
Firewalls
Job Scams
Personally Identifiable Information (PII)
Phishing
Protecting Intellectual Property
Ransomware
POLICIES & STANDARDS
PRIVACY
Privacy and Compliance
General Data Protection Regulation (GDPR)
Health Insurance Portability and Accountability Act (HIPAA)
Payment Card Industry Data Security Standard (PCI-DSS)
Personally Identifiable Information (PII)
Privacy Impact Assessment
Incident Response
Information Classification
Guidelines
Permitted Storage
Security Policy Exception
University Policies
University Standards
SERVICES
Authentication & Authorization
MFA (Multifactor Authentication)
MFA Integrations
Enterprise Active Directory (EAD)
IdentityIQ (IIQ)
Penn State Directory (LDAP)
Web Single Sign-On
Penn State Accounts
Risk Assessments
Secure Enclaves & Authority to Operate
Security Groups
User Managed Groups (UMGs)
Security Tools
CyberArk
Defender for Endpoint (aka Defender ATP)
Spirion
Splunk
System Vulnerability Scanning
Web App Assessment
Unit Security Dashboard (USD)
ABOUT US
Consulting & Architecture
Identity and Access Management
Security Operations
Strategic Plan
Get Help
Select Page
SERVICES
Information Security
Report an Incident
Security Groups
User Managed Groups (UMGs)