Our Help Desk Offers Tech support to Campus
Providing exceptional computer service and tech support to faculty, staff, and students on all UW-Platteville campuses. The ITS Help Desk will accomplish its mission by providing timely responses to calls and requests, a knowledgeable staff, courteous and professional service, and a reliable point of first contact.
Temporary Group Accounts
Camps or other ad hoc groups visiting campus may request a temporary group account to use IT resources such as lab machines and printers. Approval is required. Submitting a request does not guarantee approval.
Guest accounts are created for people that are not employees or students at UW-Platteville but are still involved with activities at our campuses. Accounts are not automatically provided or retained and accounts that are not accessed regularly may be deleted.
Passwords are the primary defense and front-line security for your data. If someone obtains your password they have complete access to your account, your data, and to ALL the system privileges you have. You must not share your password because you are responsible for all actions taken by anyone with whom you share your password.
Information security is a discipline concerned with ensuring the confidentiality, integrity, and availability of information. The goal of the Information Security program within UW-Platteville is to protect information against disclosure to unauthorized users (confidentiality), improper modification, inadvertent corruption or destruction (integrity), and to ensure access to the information exists when required (availability).
Why is information security important?
Information is the buildings blocks of the “who,” “what,” “where,” “why,” “when,” and “how” decisions that are made on a day-to-day basis. If the information cannot be protected from unauthorized access, obtained when needed by authorized users, or relied on to be accurate, then those decisions can be inaccurate or damaging to an individual or the institution. If sensitive information is not protected appropriately then individuals without authority to make decisions can dictate them. For example: a social security number, name, and address are accessed by an unauthorized individual who then maliciously uses the data to commit identify theft, negatively affecting the victim’s financial situation.
Who is responsible for information security at UW-Platteville?
EVERYONE! Students, faculty, staff, guests, and anyone who uses UW-Platteville resources has responsibility for ensuring the information they come into contact with is handled appropriately and adhering to control frameworks that may be in place around types of information or processes.
At the UW-Platteville, the information security officer (ISO) is responsible for the development of policies, procedures, standards, and implementation of information security best practices. The ISO is also the point of contact for questions, concerns, or potential incidents related to the confidentiality, integrity, and availability (CIA) of campus information.
It is important to remember – if you see something, say something. Contact the ITS Help Desk at 608.342.1400, or email email@example.com to report suspicious activity.
Is information security just about computers?
No. Information security is an organization wide program that deals with information assets in various forms, such as information transmitted across a phone call, written on a post-it-note, stored in a database, locked in a filing cabinet, included on a report, accessed from a mobile device or workstation, or being transmitted across a network. Information can be verbal (people), paper, or technology, and it needs to be protected throughout its lifecycle—while in motion, storage, and destruction.
What are some of the cybersecurity threats?
Phishing is a type of social engineering scam in which an attacker sends a message appearing to be from a legitimate source requesting personal information, which can then be used for fraudulent purposes including but not limited to identity theft, financial gain, capture credentials, or to establish communication and gain additional information to use in a more targeted attack. Many of these phishing attacks use email to deliver the attacker’s message, however the message can also be delivered using other communication methods, such as text messages or telephone calls. One specialized attack technique is 'spear phishing'. In this scam, message appears to have been sent from a trusted organizational representative to other members of that person's organization.
Check out real-life examples of phishing messages and what to look for in the ITS Knowledge Base.