image
Technology Services 

Networking and Information Security

Two-factor Authentication

As a part of Florida Poly's continuing commitment to protect its community, Technology Services has implemented a two-factor authentication process using Duo Security.

Policy and Compliance 

Technology Services promotes the secure and responsible use of the University’s network.

The department:

  • promotes information security best practices through security awareness, online resources, targeted workshops, annual security awareness programs, and by publishing policies, standards, and best practices.
  • Enforces security elements within the application, infrastructure, data architectures, and development methodologies.
  • is responsible for setting university policies, strategies, standards, and procedures for information and system security including protection, disaster recovery, and business continuance
  • provides forensic services departments needing an administrative investigation of an employee’s computer in the event of an incident
  • continually develops and implements security audits and procedures to ensure system and information integrity, availability, reliability, confidentiality, and legal/regulatory compliance measures are met.

Additionally, the Information Security Officer (ISO) provides training videos and newsletters from knowbe4 and SANS for employees self-awareness of cyber-security threats.

Surveillance 

The campus video surveillance system provides a consistent and secure means for campus entities to record, maintain, archive (at least 30 days), and access surveillance video. The camera surveillance system includes the video camera surveillance system used for the purpose of viewing and/or recording video images on University property. All recorded data is retained for 30 days.

Risk Assessment 

Risk assessment establishes the process for assessing risks associated with university data and information systems and documenting and communicating the associated risks to university leadership. The objective of the risk assessment process is to assist university leadership in making informed decisions regarding the treatment or acceptance of those risks. The risk assessments focus on the privacy and security of data based on the level of data classification as outlined in FPU: 11.00122P: Data Classification and Protection.

Unified Communications

Technology Services provides all voice/data trunks and services, campus telephone system design and operations support, panic alarms, and the moves-adds-changes process in addition to other services.

The department also provides support for campus telephone and voice mail services, networking and telecommunications services and provides support for phones and phone services, supports the video, voice, and data infrastructure. Learn more on the Unified Communications webpage.

Data Voice and Video Network

Technology Services support for campus networking and telecommunications services and provides support for supports the video, voice, and data infrastructure. Technology Services is responsible for the University's voice, video, and data networks. Areas of operation include the local area network (LAN), the wide area network (WAN), related network infrastructure, and telecommunications.

Phishing Scams

Phishing refers to sending an email that tricks a person into clicking on a link or opening an attachment. The goal of phishing is to steal information, such as usernames and passwords. Learn more about how Technology Services is keeping the University community safe. 

Anti-phishing Campaign

Technology Services sends a simulated phishing email to all employees as part of an anti-phishing campaign. The email uses the same tricks phishers use to get recipients to lower their guard and give up sensitive information. Phishing emails which may appear as official Florida Poly communications are sent to internal recipiants. These messages encourage a user to click a link or download a file.