The overarching goals of the SecureCarolina technologies are to:
- Determine the risk and impact of compromise by correlating the vulnerabilities present
and amount of sensitive data on each device.
- Prevent unauthorized access to, and disclosure of, sensitive data in transit and at
- Prevent unauthorized access to business services.
- Increase detection rates of compromise; expedite its eradication and the restoration
of business services and devices.
The following SecureCarolina technologies are available for use.
Consult your local systems administrator or SA contact for more information.
DNS Security helps prevent information security incidents by adding threat intelligence
into the DNS translation process. That intelligence prevents adware, malware, botnets,
phishing attacks, and other known bad websites from being accessed.
To maintain a healthy network, it is important that network devices be given a clean
bill of health when they join. The need for endpoint protection extends to PCs, laptops,
smartphones, tablets, and other equipment.
Security incidents are going to happen. It simply takes too long to recover from
them. To help the university recover as quickly as possible, the UISO has deployed
an incident response solution that automates some of the time-consuming steps of incident
response and also helps with forensic investigations.
Many of the largest data breaches begin with a compromised password. Enabling multi-factor
authentication (MFA) adds an additional layer of protection to your accounts and the
data you access by making sure a stolen password is not enough to allow access to
Secure File Sharing
Cloud storage and collaboration with others, both internal and external to the organization,
are the norm for today’s workforce. Microsoft’s OneDrive for Business is the University
of South Carolina’s secure solution for both.
Sensitive Data Discovery
The first step in determining the appropriate safeguards for a resource is to identify
the sensitivity of data that it stores or handles. To this end, the University Information
Security Office (UISO) has begun deploying a sensitive data discovery tool that will
aid in inventory of sensitive data.
Hardening your computer is an important step in the fight to protect university data
and information. This process works to eliminate means of attack by identifying vulnerable
configurations and turning off unneeded services.
Whole Disk Encryption
People are turning more and more to portable devices like laptops for their daily
work, and physical security measures like locked doors no longer provide as much coverage
as they once did. When a device is lost or stolen, the data on it is at risk.