Information Security

Articles related to two-factor authentication, encryption, phishing/spam, compromised accounts, quarantined devices, malware, Information Security Training and Firewall Exceptions.

Categories (3)

Multi-Factor Authentication

Multi-factor authentication adds another layer of security when logging in to MSU systems and is required for most university accounts. The first factor required to log in is something you know, i.e. your NetID/NetPassword. The additional factor is something you have, typically your smartphone or tablet. Therefore, even if someone is able to get your NetID/NetPassword, they should not be able to log in to your account because they do not have your other factor.


Articles related to phishing and SPAM email


Articles related to network quarantine

Articles (9)

Application Restriction Information - TikTok, WeChat, ByteDance, and more

Information regarding restricted applications and services at MSU.

How to Download InfoSec IQ certificate

How to download your InfoSec IQ Certificate (PDF)

IT Security Tools

List of IT security tools available to MSU users.

Reasons why you could be having issues with InfoSec IQ

Cannot access our InfoSec IQ training? Here are a few reasons why it might not be working.

What if my account becomes Compromised?

Whenever MSU finds evidence that an MSU account has been hacked or compromised the account is disabled and the user is contacted via telephone.

How to Protect Yourself from Identity Theft

The following tips can help lower your risk of becoming a victim of identity theft.

Information Security Policy Information

Mississippi State University necessarily maintains a large amount of sensitive information ranging from personal information about employees and students to research data. Protection of this information from leaks, break-ins, and natural or man-made disasters is of paramount importance. To this end, the Mississippi State University Information Security Policy, OP 01.10, mandates a framework of four components that collectively enhance the information security posture of the institution.