SecureCarolina Technologies
                     			
                     The overarching goals of the SecureCarolina technologies are to:
                     
                     
                        
                        - Determine the risk and impact of compromise by correlating the vulnerabilities present
                           and amount of sensitive data on each device.
 
                        
                        - Prevent unauthorized access to, and disclosure of, sensitive data in transit and at
                           rest.
 
                        
                        - Prevent unauthorized access to business services.
 
                        
                        - Increase detection rates of compromise; expedite its eradication and the restoration
                           of business services and devices.
 
                        
                     
                     		
                     
                        
                           
                              			
                              SecureCarolina Technologies Available for Use
                              
                              Consult your local systems administrator or SA contact for more information.
                              
                              
                                 
                                       
                                          DNS Security
                                          
                                       DNS Security helps prevent information security incidents by adding threat intelligence
                                          into the DNS translation process. That intelligence prevents adware, malware, botnets,
                                          phishing attacks, and other known bad websites from being accessed.
                                     
                                    
                                 
                                 
                                       
                                          Endpoint Protection
                                          
                                       
                                       Microsoft Defender for Endpoint is Microsoft's endpoint security platform that goes far and beyond the traditional anti-malware engine and firewall to protect
                                          against the modern cybersecurity threats an organization faces.
                                        
                                    
                                 
                                 
                                       
                                          Multifactor Authentication
                                          
                                       
                                       Many of the largest data breaches begin with a compromised password. Enabling multifactor
                                                   authentication (MFA) adds an additional layer of protection to your accounts and the
                                                   data you access by making sure a stolen password is not enough to allow access to
                                                   data.
                                        
                                    
                                 
                                 
                                       
                                          Secure File Sharing
                                          
                                       
                                       Cloud storage and collaboration with others, both internal and external to the organization,
                                          are the norm for today’s workforce. Microsoft’s OneDrive is the University of South
                                          Carolina’s secure solution for both. 
                                        
                                    
                                 
                                 
                                       
                                          System Hardening
                                          
                                       
                                       Hardening your computer is an important step in the fight to protect university data
                                             and information. This process works to eliminate means of attack by identifying vulnerable
                                             configurations and turning off unneeded services.
                                        
                                    
                                 
                                 
                                       
                                          Whole Disk Encryption
                                           
                                       
                                       People are turning more and more to portable devices like laptops for their daily
                                          work, and physical security measures like locked doors no longer provide as much coverage
                                          as they once did. When a device is lost or stolen, the data on it is at risk.