Updating...
Skip to main content
Filter your search by category. Current category:
All
All
Knowledge Base
Service Catalog
Search the client portal
Search
Sign In
Show Applications Menu
Client Portal
Sign In
Search
IT Support
Projects
Services
Knowledge Base
More Applications
Skip to Services content
Services A-Z
Search
Services
Service Catalog
Information Security
Information Security
Services related to server and application security, identity theft, data breaches, and copyright.
Categories (3)
Vulnerability Management
Request vulnerability scanning or scanning exceptions for servers and web-based applications.
Expand
Multifactor Authentication
Campus multifactor authentication.
Expand
Level 1 Data Storage
Expand
Services (10)
Report a lost or stolen device
Report a lost or stolen desktop computer, laptop, or smartphone.
Report a spam or phishing email
Report a fraudulent email, spam, or phishing scam.
Request a security assessment
Request a security assessment on a campus server or web application.
eDiscovery/PRA Request
Request electronic records in response to matters of litigation, subpoenas or California Public Records Act requests.
Request a Legal Hold
Secure all electronic information requested in a legal hold.
Report a security issue/concern
Non-emergency information security questions or issues.
Single Sign-On assistance
Request new Single Sign On authentication for application or get help with authentication issues with Shibboleth or CAS.
Credit card processing (PCI) review
The Payment Card Industry Data Security Standard (PCI DSS) is a multifaceted security standard that includes requirements for security management, policies, procedures, network architecture, software design and other critical protective measures. This standard is designed to minimize both the chance of a card member data compromise and the effects if a compromise does occur.
Server SSL certificate request
SSL Certificates are used to create secure connections between a user and the server they are trying to reach, using encryption. This encrypted connection is created through the use of public key cryptography, which is a set of well-established techniques and standards for protecting communications from eavesdropping, tampering, and impersonation attacks.
System Application Security Checklist (SASC)
Popular Services
Help Installing, Configuring, and Accessing Software
Web Support
Software - IT Procurement Review (ITPR)
Help with a computer, laptop, tablet, or smartphone
Wildcat ID Card
My Recently Visited Services
Wildcat ID Card
Transfer Ownership of Box Content
ARC Cart
Request a new wired connection
IT Technical Change Management - Standard
Popular Tags
HR
(14)
FMS
(9)
onesolution
(4)
peoplesoft
(4)
rfdn
(4)
rfit
(4)
sap
(4)
AD
(3)
Box
(3)
directory
(3)