Best Practices for Managing Logs
CERT's Guideline's UNIX Configuration
Cloud Computing
Defense in Depth - Security at Iowa
E-Commerce: Payment Card Industry Data Security Standards (pdf) from VISA
E-Discovery/ Litigation Holds - What is E-Discovery and ESI?
Eight Steps to Secure Your Copier or Multi-Function Device
Encryption Support Resources for IT-Admins
Departmental Access to E-mail/Home Drive Accounts Procedures
Iowa Computer Security Incident Response Team - I-CSIRT Program
Iowa Regents Security and Network Log Retention Guidelines
IT Security Plan Template
ITS Linux & Unix Systems Support
Learn About Security (IT)
SANS - Top Cyber Security Risks!
Secure-removal-of-data
Self-Managed Computers: Guide
SSL Web Server Certificate Service
Travel Checklist
UI Disaster Recovery and Business Continuity Planning Resources
UI Network Security Scanning Service
University IT Policies
Resources for Everyone
Resources for Faculty and Staff