{"id":30653,"date":"2024-04-19T10:09:28","date_gmt":"2024-04-19T14:09:28","guid":{"rendered":"https:\/\/marymount.edu\/academics\/?page_id=30653"},"modified":"2024-04-19T10:09:28","modified_gmt":"2024-04-19T14:09:28","slug":"information-security","status":"publish","type":"page","link":"https:\/\/marymount.edu\/academics\/services-resources\/technology-services\/information-security\/","title":{"rendered":"Information Security"},"content":{"rendered":"

IT Infrastructure and Security provides a secure, compliant, robust, scalable and efficient technology infrastructure and oversees the day-to-day support of all platforms. The scope of technology supported includes wireless and wired networks, servers, university wide email and related applications, telecommunications services, television services, data wiring, and classroom audio-visual systems.<\/p>\n

Multifactor Authentication<\/h2>\n

Multifactor, 2-Factor, or 2-Step authentication (MFA) adds an additional layer of security and protection to everyone\u2019s account.  The ITS Department recommends installing and using an authentication app on your mobile device for the best reliability, but SMS message authentication is also an option.  Please see the attached guides for getting started:<\/p>\n

Getting Started with MFA for Okta and Gmail : MFA-for-Okta-and-Gmail-20220819.pdf<\/a>
\nManaging MFA Methods with Okta : 
Managing-Okta-MFA-Methods-20220920<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"

IT Infrastructure and Security provides a secure, compliant, robust, scalable and efficient technology infrastructure and oversees the day-to-day support of all platforms. The scope of technology supported includes wireless and wired networks, servers, university wide email and related applications, telecommunications services, television services, data wiring, and classroom audio-visual systems. Multifactor Authentication Multifactor, 2-Factor, or 2-Step […]<\/p>\n

Read More…<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":574,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/left-sidebarpage.php","meta":{"_acf_changed":false,"_lmt_disableupdate":"","_lmt_disable":"","ngg_post_thumbnail":0,"footnotes":""},"acf":[],"yoast_head":"\nInformation Security - Marymount University<\/title>\n<meta name=\"description\" content=\"IT Infrastructure and Security provides a secure, compliant, robust, scalable and efficient technology infrastructure and oversees the day-to-day support . Click here to learn more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/marymount.edu\/academics\/services-resources\/technology-services\/information-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security\" \/>\n<meta property=\"og:description\" content=\"IT Infrastructure and Security provides a secure, compliant, robust, scalable and efficient technology infrastructure and oversees the day-to-day support . Click here to learn more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/marymount.edu\/academics\/services-resources\/technology-services\/information-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Academics - Marymount University\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/marymount.edu\/academics\/services-resources\/technology-services\/information-security\/\",\"url\":\"https:\/\/marymount.edu\/academics\/services-resources\/technology-services\/information-security\/\",\"name\":\"Information Security - Marymount University\",\"isPartOf\":{\"@id\":\"https:\/\/marymount.edu\/academics\/#website\"},\"datePublished\":\"2024-04-19T14:09:28+00:00\",\"dateModified\":\"2024-04-19T14:09:28+00:00\",\"description\":\"IT Infrastructure and Security provides a secure, compliant, robust, scalable and efficient technology infrastructure and oversees the day-to-day support . Click here to learn more.\",\"breadcrumb\":{\"@id\":\"https:\/\/marymount.edu\/academics\/services-resources\/technology-services\/information-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/marymount.edu\/academics\/services-resources\/technology-services\/information-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/marymount.edu\/academics\/services-resources\/technology-services\/information-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Academics\",\"item\":\"https:\/\/marymount.edu\/academics\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services and Resources\",\"item\":\"https:\/\/marymount.edu\/academics\/services-resources\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Information Technology Services\",\"item\":\"https:\/\/marymount.edu\/academics\/services-resources\/technology-services\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Information Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/marymount.edu\/academics\/#website\",\"url\":\"https:\/\/marymount.edu\/academics\/\",\"name\":\"Academics - Marymount University\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/marymount.edu\/academics\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Information Security - Marymount University","description":"IT Infrastructure and Security provides a secure, compliant, robust, scalable and efficient technology infrastructure and oversees the day-to-day support . Click here to learn more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/marymount.edu\/academics\/services-resources\/technology-services\/information-security\/","og_locale":"en_US","og_type":"article","og_title":"Information Security","og_description":"IT Infrastructure and Security provides a secure, compliant, robust, scalable and efficient technology infrastructure and oversees the day-to-day support . Click here to learn more.","og_url":"https:\/\/marymount.edu\/academics\/services-resources\/technology-services\/information-security\/","og_site_name":"Academics - Marymount University","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/marymount.edu\/academics\/services-resources\/technology-services\/information-security\/","url":"https:\/\/marymount.edu\/academics\/services-resources\/technology-services\/information-security\/","name":"Information Security - Marymount University","isPartOf":{"@id":"https:\/\/marymount.edu\/academics\/#website"},"datePublished":"2024-04-19T14:09:28+00:00","dateModified":"2024-04-19T14:09:28+00:00","description":"IT Infrastructure and Security provides a secure, compliant, robust, scalable and efficient technology infrastructure and oversees the day-to-day support . Click here to learn more.","breadcrumb":{"@id":"https:\/\/marymount.edu\/academics\/services-resources\/technology-services\/information-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/marymount.edu\/academics\/services-resources\/technology-services\/information-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/marymount.edu\/academics\/services-resources\/technology-services\/information-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Academics","item":"https:\/\/marymount.edu\/academics\/"},{"@type":"ListItem","position":2,"name":"Services and Resources","item":"https:\/\/marymount.edu\/academics\/services-resources\/"},{"@type":"ListItem","position":3,"name":"Information Technology Services","item":"https:\/\/marymount.edu\/academics\/services-resources\/technology-services\/"},{"@type":"ListItem","position":4,"name":"Information Security"}]},{"@type":"WebSite","@id":"https:\/\/marymount.edu\/academics\/#website","url":"https:\/\/marymount.edu\/academics\/","name":"Academics - Marymount University","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/marymount.edu\/academics\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/marymount.edu\/academics\/wp-json\/wp\/v2\/pages\/30653"}],"collection":[{"href":"https:\/\/marymount.edu\/academics\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/marymount.edu\/academics\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/marymount.edu\/academics\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/marymount.edu\/academics\/wp-json\/wp\/v2\/comments?post=30653"}],"version-history":[{"count":1,"href":"https:\/\/marymount.edu\/academics\/wp-json\/wp\/v2\/pages\/30653\/revisions"}],"predecessor-version":[{"id":30654,"href":"https:\/\/marymount.edu\/academics\/wp-json\/wp\/v2\/pages\/30653\/revisions\/30654"}],"up":[{"embeddable":true,"href":"https:\/\/marymount.edu\/academics\/wp-json\/wp\/v2\/pages\/574"}],"wp:attachment":[{"href":"https:\/\/marymount.edu\/academics\/wp-json\/wp\/v2\/media?parent=30653"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}