Ways we help
We help IT Professionals by providing the best security controls possible and by meeting increasingly challenging policy, granting agency and regulatory requirements. We can provide advice regarding requirements to plan for, buy or build technology solutions that perform well and set up your customers for success.
Identity, Privacy and Cybersecurity teams are available to help University of Illinois IT Pros maintain the highest standards of privacy and cybersecurity as you manage, systems, networks, software and customer needs.
Urgent/critical cybersecurity event monitoring and response (security@illinois.edu)
- Incident intake, triage, validation and response
- Vulnerability/exposure intake, triage, validation and response
- Threat intake, triage, validation and response (response can include situation containment, mitigation and critical consultation)
- As-needed emergent engagement with leadership enacted when administrative process is required due to standing requirements, commitments, laws, policies or procedures.
- Continual monitoring, scanning, intelligence gathering and network interrogation techniques to be employed for the purpose of detecting cybersecurity vulnerabilities, threats, exposures, breaches, anomalous activity, risks borne from noncompliance, cybersecurity incidents, misconfigurations or other activities and conditions that may contribute to risk.
- Notification provided to owners of record after mitigation actions are taken, as soon as is practical. A best-effort process will be employed to contact security liaisons and/or stewards. Process assumes contacts are registered and findable in the Contacts Database, Security Liaisons registry or otherwise immediately identifiable using established university enterprise constructs.
Consulting services
Cybersecurity consulting (securitysupport@illinois.edu)
- Non-emergency consultation requests
- Cybersecurity planning
- Security policy support
- Compliance guidance
- Security engineering requests
- Feedback gathering
- Tools maintenance
- Cybersecurity resource support
Privacy consulting (privacy@illinois.edu)
- Customer service requests/general Inquiries
- Requesting a new privacy service, project or capability
- Privacy consultations
- New purchase/third party product or service reviews
- Compliance-related questions
- Privacy impact assessments
- Reporting a possible data incident
- Other privacy concerns
Identity and access consulting (techservices-iamu@illinois.edu)
- Identity creation and questions around changes to your NetID, as well as sponsored and/or affiliated NetID support
- Credential storage and support of your SSL certificates through InCommon (Sectigo)
- Authentication and authorization and questions around Authman, AD and AzureAD
- Single Sign-On application integration and how you can integrate departmental applications with the campus SSO solution
Job aids, tools and services, and cybersecurity training
We provide resources to help IT Professionals with cybersecurity related functions.
IT Pro FAQs
Securing devices
- How to report a compromised machine: https://answers.uillinois.edu/illinois/56730
- Reporting a stolen device: https://answers.uillinois.edu/illinois/70754
Securing email
- How to report a phishing email: https://answers.uillinois.edu/illinois/50007
- Retirement of email forwarding: https://answers.uillinois.edu/illinois/110048
- Massmail guidelines: https://answers.uillinois.edu/illinois/page.php?id=78062
- How to forward email as an attachment: https://answers.uillinois.edu/illinois/56069
Securing data and files
- Department access to an employee’s email/files: https://answers.uillinois.edu/illinois/48321
Securing networks
- Getting started with CrowdStrike: https://answers.uillinois.edu/illinois/106593