Please complete the Cybersecurity Exception Request form with academic/business unit leadership and sign the approval before submitting it. If you would like to meet with a Cybersecurity GRC analyst to assist with the form, please inform the team using the TeamDynamix ticket.
Request Cybersecurity training for staff or faculty members.
The Cybersecurity team provides leadership in establishing technology, policies, standards and practices to enhance information security for USNH.
Request access to One Leavitt Lane or report issues with existing access.
Messages quarantined as High Confidence Phishing by Microsoft have met specific conditions; whether it’s suspicious message composition commonly seen in phishing messages, inclusion of suspicious or malicious links or attachments, or even poor sender reputation. Once quarantined as High Confidence Phishing, the message must be reviewed by USNH CyberOps to ensure it presents no real threat to USNH IT Systems and the community prior to its release.
The Cybersecurity Operations team is available to assist in responding to and investigating events and incidents that may have information security implications (e.g. Red Flag, Compromised Account, Unauthorized Access, etc.)
An IT risk assessment is a thorough look at your USNH owned and ET&S managed IT system to identify software, hardware, situations, processes, etc. that may cause harm to your system. After identification is made, an analysis and evaluation is conducted to see how likely and severe the risk is. When this determination is made, a further investigation is conducted to decide what measures should be in place to effectively eliminate or control the harm from happening. Request a Risk Assessment of an USNH IT system if you suspect it may be at risk.
In this request form, you will need to identify each workstation by device name, so that ET&S can establish administrative privileges for your secondary account on those devices specifically. You may also upload a list of devices using the Attachment field.
You will also need to provide a description of the devices and what their purpose is, along with a detailed description of the justification/business need for you to have administrative control.
Technology Vendors who may be contracted to provide IT services to The University System of New Hampshire or USNH institutions must demonstrate compliance with applicable USNH policies and/or regulatory standards by completing a Security Assessment Review.
If you are experiencing problems with a security camera that is on the USNH network AND is currently in the Wisenet Wave video management system (VMS), click on the green “Request Service” button and submit the request form.
Video cameras that are installed at the University of New Hampshire for safety and law enforcement purposes and video data from such cameras must comply with the Public Safety Video Camera System (PSVCS) standard.
All use of USNH institutional information must be approved by the appropriate data steward including use of institutional data housed in one system or application that will be uploaded/sent/feed into another system or application. The Data Access Request process facilitates requesting, approving, and tracking requests for access to and use of data.
Leveraging the Acunetix Web Vulnerability Scanner (WVS), Enterprise Technology & Services allows application developers to request scans of their development sites before rolling into production to determine if any vulnerabilities exist.