Skip to content

Cybersecurity

Cybersecurity

Clemson University’s Office of Information Security is committed to protecting the confidentiality, integrity, and availability of information for its faculty, staff and students. To support these goals, the CCIT Office of Information Security promotes awareness through education to assist with understanding, recognizing and implementing security best practices.

 

Report Security Incident
Office of Information Security Logo
Popup window contained within a browser window with explaination text saying can't move popupoutside of window

Browser in the Browser Trick

There has been an increase in cybercriminals using the Browser in the Browser (BitB) trick to steal login and password information. This trick has become more common on social media platforms such as Facebook and Instagram, but it can be used in any environment that uses a login page.

Tips to Avoid the BitB Trick

Bring Your Own Device Policy FAQ

Clemson University has a new Bring Your Own Device (BYOD) Policy. Its purpose is to make sure that your devices meet the minimum requirements before they are granted access to Clemson University IT Resources and Systems. Personally owned computing devices (“personal devices”) include desktop or laptop computers as well as mobile devices, such as cell phones or tablets, that are owned and managed by you, personally. You can visit the BYOD FAQ page for more information.

Bring Your Own Device Policy and FAQs
Holding a cell phone in hands

Popular Pages

Duo Authentication

Setting up Duo to enable two factor authentication to protect your Clemson users accounts.

IT Policies and Procedures

It is important to be aware of the University's procedures and standards, as well as any policy that is applicable and required in your role(s) at the University.

Data Classification

Clemson University is committed to protecting the privacy of its students, faculty and staff while protecting the confidentiality, integrity and availability of information important to the University’s mission.

Quarantined Email

Clemson University's email system will quarantine any suspicious email. Users can release some emails themselves and request the release of high confidence phishing emails by using the Release Quarantined Email Service in the TigerHUB system.

Cybersecurity Alerts

Clemson students working on laptop computers
Clemson Computing and Information Technology
Clemson Computing and Information Technology | 116 Sigma Dr, Clemson, SC 29634