If you suspect a security breach, as defined in the Information Security Incident Response Standard, has occurred, you should immediately do the following: Isolate the compromised system by unplugging ...
I. The safety of students, staff, faculty, and visitors is a paramount concern, especially during an emergency. The use of the emergency notification system provides for the rapid dissemination of ...
The UTSA Office of Information Security (OIS) is committed to addressing all attempted, suspected and confirmed information security incidents with a swift and effective response to protect Data and ...
The purpose of this document is to define general requirements for responding to an information security incident. The Information Security Incident Response Program and subordinate procedures define ...
I recently wrote about my impressions of the 2022 NASCIO Midyear Conference. One of my takeaways was how much discussion there was about collaborating with local governments, especially on ...