Skip to Content

University Technology Services


Thomas Cooper Library at sunset.

SecureCarolina Technologies

The overarching goals of the SecureCarolina technologies are to:

  • Determine the risk and impact of compromise by correlating the vulnerabilities present and amount of sensitive data on each device.
  • Prevent unauthorized access to, and disclosure of, sensitive data in transit and at rest.
  • Prevent unauthorized access to business services.
  • Increase detection rates of compromise; expedite its eradication and the restoration of business services and devices.

The following SecureCarolina technologies are available for use.

Consult your local systems administrator or SA contact for more information.

Umbrella

DNS Security

DNS Security helps prevent information security incidents by adding threat intelligence into the DNS translation process. That intelligence prevents adware, malware, botnets, phishing attacks, and other known bad websites from being accessed.

Symantec Endpoint Protection logo

Endpoint Protection

To maintain a healthy network, it is important that network devices be given a clean bill of health when they join.  The need for endpoint protection extends to PCs, laptops, smartphones, tablets, and other equipment. 

List Thumbnail

Incident Response

Security incidents are going to happen.  It simply takes too long to recover from them.  To help the university recover as quickly as possible, the UISO has deployed an incident response solution that automates some of the time-consuming steps of incident response and also helps with forensic investigations. 

List Thumbnail

Multi-factor Authentication

Many of the largest data breaches begin with a compromised password. Enabling multi-factor authentication (MFA) adds an additional layer of protection to your accounts and the data you access by making sure a stolen password is not enough to allow access to data.

OneDrive logo

Secure File Sharing

Cloud storage and collaboration with others, both internal and external to the organization, are the norm for today’s workforce. Microsoft’s OneDrive for Business is the University of South Carolina’s secure solution for both. 

List Thumbnail

Sensitive Data Discovery

The first step in determining the appropriate safeguards for a resource is to identify the sensitivity of data that it stores or handles. To this end, the University Information Security Office (UISO) has begun deploying a sensitive data discovery tool that will aid in inventory of sensitive data.

CIS Logo

System Hardening

Hardening your computer is an important step in the fight to protect university data and information. This process works to eliminate means of attack by identifying vulnerable configurations and turning off unneeded services.

sa

Whole Disk Encryption  

People are turning more and more to portable devices like laptops for their daily work, and physical security measures like locked doors no longer provide as much coverage as they once did. When a device is lost or stolen, the data on it is at risk.