Security Sub-Categories

Controlled Unclassified Information (0)
Controlled Unclassified Information (CUI) is government created or owned information that requires safeguarding or dissemination controls consistent with applicable laws, regulations and government wide policies.
Security Articles RSS Feed
Added on Wed, Jan 25, 2017
What Two-factor authentication requires something you know (your Clemson password) and something you have (like a mobile phone, tablet, or a smartphone app) as an added layer of security to prevent anyone else from accessing your account. Two-factor... Read More
HOW TO: Computer Security and Virus Protection
Added on Wed, Feb 4, 2015
Antivirus Employees should contact their Tech Support Provider to have anti-virus software installed on their computer if it is not already there. Clemson has a Trend Micro account for employees. Note that students who have Windows 10 or 11 can use... Read More
ISSUE: User Files are Encrypted and Held for Ransom
Added on Wed, Apr 27, 2016
Problem: User entered a ticket stating that all of their files had been encrypted and now would have to pay a “ransom” to have their files decrypted. Sure enough, every .doc, .docx, .xlsx, .pdf, music file and picture were appended with the ... Read More
Added on Wed, Nov 6, 2019
Clemson Login Check is available at . If you are not already logged in to the Clemson network, you may see a Clemson login screen. Next you will see this:  You will see your username, XID, first and last names. If... Read More
What To Do if Your Electronic Device is Stolen
Added on Mon, Oct 2, 2017
If you are a victim of a theft on campus, the first step you should take is to report it to the campus police by calling (864)656-2222. From there, the police will be able to work with CCIT security to try to locate your device if it has been... Read More
Safe Computing
Added on Wed, Aug 5, 2020
Security is a part of our everyday thinking in this day and age. Clemson University takes security seriously and wants our users to be vigilant and practice due diligence when it comes to security. It is important that our users understand what is... Read More