UNG | Information Security

Incident Response An incident is an unusual occurrence or breach in the security of a computer or network system or a violation of a standing policy, which may have an actual or potential adverse affects on an information system. It is important for organizations and home users alike to have […]

Incident Response

An incident is an unusual occurrence or breach in the security of a computer or network system or a violation of a standing policy, which may have an actual or potential adverse affects on an information system. It is important for organizations and home users alike to have an incident response plan in place and to know how and who to contact in the event you witness an incident or violation of a security policy.

In an effort to provide a means to communicate computer and network security concerns, the University of North Georgia is working on providing this form online for your convenience. To report an incident, visit the Information Security, Incident Response link at MyUNG to begin!

Business Continuity

The continuity of operations is the preparation, processes, and practices required to ensure the University continues operating after having faced a major disruption of operations. To achieve this, the University must identify, select, implement, test, and update procedures and processes necessary to protect critical business processes from the effects of a major disruption and to be able to restore the business processes in a timely manner. This topic often within the security circles also includes disaster recovery planning, which addresses the detail process for recovering information or an IT system in the event of a catastrophic disaster such as a fire…. To learn more, visit the Information Security, Business Continuity link at MyUNG.

Risk Management

Managing risks is the process of identifying and measuring security risks associated with an information system, and controlling and reducing those risks to an acceptable level. Often, risk management is applied to business continuity, business impact analysis, and disaster recovery. The objective is to eliminate, reduce or mitigate the instances of risk. To do this requires and understanding of threat, vulnerability, and controls….To learn more, visit the Information Security, Risk Management link at MyUNG.

Security Awareness Training

Interested in learning about viruses, Trojans, zombies, and bot-nets are? Want to lean how to better secure you computer for yourself and your family? Do you want to know more about Information Security? Visit the Information Security, Security Awareness Training link at MyUNG to begin!

Contact Information

If you need to contact a member of the Information Security staff, please contact the [email protected] or visit MyUNG for further information.

Thank you for assisting us in providing a more secure computing experience!

Next Post

Scientists to use CRISPR gene-editing technology for Phase 1 vaccine trials in humans

Reviewed by Emily Henderson, B.Sc.Sep 25 2020 Scientists are planning for Phase 1 human trials of a vaccine they developed by using CRISPR gene-editing technology to mutate the parasite that causes leishmaniasis, a skin disease common in tropical regions of the world and gaining ground in the United States. In […]