Network & Computing Security
The Technology Services, Information Security Office, supports the goals of GRU by assuring the availability, integrity, and confidentiality of information; and to provide a flexible, but secure computing environment that facilitates the healthcare, research, and academic mission, while increasing information security awareness at GRU.
If you believe that an GRU computer system, or a system connected to GRU's computer network, has been compromised, or is in imminent danger of being compromised, please report it to the Information Technology Help Desk at (706) 721-4000.
Security Assessments Services:
IT Risk Assessment - used to gather information, analyze, and determine security vulnerabilities associated with information systems and related business practices. IT risk assessments are necessary to analyze and mitigate threats to GRU information technology assets, which may come from any source including natural disasters, internal threats, the Internet, equipment, or service malfunction or breakdown.
Vulnerability Scan - a component of assessing risk in which software is employed to seek out IT security flaws based on a database of known weaknesses, testing systems for the occurrence of these weaknesses and generating a report of the findings that can use to reduce risk through mitigation or elimination. * Please note that unauthorized scanning to or from an GRU system is not permitted.
Security Awareness Training - Awareness Training and Education is an ongoing process of educating our network users on potential risks or security concerns. Security awareness training sessions are available for departments upon request.
Additional Links:- HIPPA and FERPA Information
- Mobile Security: Tips to Keep Your Mobile Device Safe