Information Technology A to Z Index



Incident Response (Create a form where folks could send in things they encounter...)

Send an email to
To the best of your knowledge, please let us know:
• The nature of the incident. Was a system or application compromised? If so, how?
• When did the incident occur, and when was it discovered?
• How was the incident discovered?
• What is the scope of the incident? How many systems are affected? How many users have been affected?
• Was there any sensitive data (confidential, regulated, etc.) on the affected systems or was any accessed during the time of compromise?
• All available, relevant logs (include logs on the affected system, as well as the firewall, domain, and IDS logs).
• All applications that reside on this system (include databases, servers, and user applications).
• Where the most recent backup resides, how often the system was backed up, and when it was last backed up.
• Who should have access to the system, when they should be accessing it, how they should be accessing it (console, VPN, etc.), and what data they should be accessing.

Spam & Phishing

If you believe an email is spam or phishing, please forward to IT here: 

In the unlikely event you forward the spam email a legitimate email, we will tell you it is legitimate.

Antivirus & Malware Protection

Antivirus software detects and removes malicious software from your computer.  Up-to-date antivirus is an essential component of technology security on all devices, including computers, smartphones, and tablets.

Beginning July 30, 2018-EKU IT will no longer use Symantec Endpoint Protection but will move to Windows Defender for employee work computers.

Beginning July 30, 2018-EKU IT will no longer use Symantec Endpoint Protection but will move to Windows Defender for student-owned personal computers.

EKU IT also offers faculty/staff a copy of Malwarebytes Anti-Malware for their work PCs and student's a copy for their personal PCs as long as they are current EKU students.  IT Geeks will assist with installation.


Disk/Tape Destruction

Disk Encryption

Beginning in summer 2018 all EKU employees will have encrypted hard drives in their work PCs.....


Whether you are traveling internationally or domestically, it's important to know how to protect your devices and data while you travel.  Criminals know that many of us let our guard down while traveling, choosing convenience over security. 

Mobile Security

Mobile devices include laptops, tablets, smartphones, and removable storage devices (e.g., USB drives, external hard drives).  Smartphones and tablets are incredibly powerful computers that are just as susceptible to security issues and malicious attacks as desktop and laptop computer.  Mobile devices create an even greater danger because they are easily lost or stolen.


The EKU IT Security Team offers security consulting to help all members of the EKU community understand and comply with best practices in protecting themselves and EKU data and system.


Here are a few things you can do today to significantly increase your workplace and personal security:

  1. Choose and use unique and strong passwords
  2. Don't reuse passwords
  3. Don't leave your computer, tablet, or phone unattended
  4. Lock your computer, tablet, or phone when not in use
  5. Don't open unsolicited or suspicious email attachments or click on links
  6. Use antivirus software
  7. Turn on your computer's firewall
  8. Patch and update operating systems and other software
  9. Reboot your computer daily
  10. Use a password manager


Published on July 22, 2015