Search12 Results

Services or Offerings?
Request IT Security consulting services related to University IT security policy, compliance, or System Security Plans.

Complete assigned IT Security Awareness Training.

Report a security incident and request help with responding to and recovering from a significant interruption of IT services.

Request a risk assessment to determine the level of risk to your organization's systems and information.

Request the installation of Identity Finder to scan a computer for personally identifiable information.

Report a suspect phishing or spam email.

Report that you suspect your account or UTC-issued device has been compromised.

Request a two-factor hardware token if you do not have a smartphone.

Request access to desktop or mobile software that is not currently offered by UTC IT.

Request the installation of desktop software in a lab during a specified maintenance window.

Request assistance with 2FA.

Request help with Duo, our two-factor authentication application.