Texas State University Logo
adjust type sizemake font smallermake font largerreset font size

IT Security


Mission & Vision

IT Security at Texas State strives to ensure the confidentiality, integrity, and availability of University data, information, communications, and services. To accomplish this, we research, educate, assess, and consult in the areas of security risk, practice, policy, and technology.
IT Security provides leadership to the University in information incident investigation and response.


Poilcies Feature Image


All Texas State University employees, staff and students must comply with UPPS and should be familiar with them. Violating them can lead to serious implications.
Server Management Feature Image

Server Management

Server administrator must comply with policies and make sure their servers are up to date with the latest patched to reduce the possibility of being exploited.
Encryption Feature Image


Whether it's your personal or work computer, you should keep your information on your machine secure by encrypting it.
Vulnerability Scan Feature Image

Vulnerability Scan

Server administrators must fill out the necessary form in order to request a vulnerability scan and keep in compliance with UPPS.
Staying Safe Online Feature Image

Staying Safe Online

Make sure to stay safe online by following our best practices. Whether its mobile security or securing your wireless access.
Thumbnail for Poilcies Poilcies
Thumbnail for Server Management Server Management
Thumbnail for Encryption Encryption
Thumbnail for Vulnerability Scan Vulnerability Scan
Thumbnail for Staying Safe Online Staying Safe Online

Upcoming Events and Workshops

When Training Name Where
Wed, September 2, 2015 2:30 p.m. - 4:30 p.m. DIY (Do It Yourself) Security JCK 460/Avery 365
Thu, September 3, 2015 8:30 p.m. - 10:30 p.m. DIY (Do It Yourself) Security JCK 460/Avery 365
Mon, December 7, 2015 2:30 p.m. - 4:30 p.m. Mobile and Smart Device Security JCK 460/Avery 365
Tue, December 8, 2015 8:30 p.m. - 10:30 p.m. Mobile and Smart Device Security JCK 460/Avery 365