Learn five simple habits that make a big difference in protecting your Pitt account and personal information from common threats like phishing emails and password theft.
If you have any reason to suspect a security issue, contact the Pitt Digital Security team immediately so that we may assess the issue.
Protect your data and the University with powerful security software titles, tools, and resources at no or reduced costs.
Get personalized guidance from the security experts of Pitt Digital by requesting a consultation to evaluate your needs and solutions.
Learn five simple habits that make a big difference in protecting your Pitt account and personal information from common threats like phishing emails and password theft.
Multifactor authentication is like a second lock on your door—even if someone gets your password, they still can't access your account without your phone.
Pitt's email security tools automatically filter spam, block malicious messages, and flag suspicious content—helping protect you before threats reach your inbox.
From secure file sharing to email filtering, Pitt provides security tools designed to work quietly in the background while you focus on your work.
Need security guidance for your team or unit? Request customized training that addresses your specific concerns and workflows.
Pitt Digital Security can help you identify potential threats before they become issues for your department. Are you concerned that your data has already been compromised? Pitt Digital Security will help you assess the situation, manage the incident, and respond to University stakeholders and legal partners.
Ensure appropriate access for network users through network security controls, ID management, authentication measures, physical security, remote support tools, and encryption management.
Request our help to quickly restore normal service operations after an incident and minimize the impact on business operations — ensuring service quality and availability are maintained.
Partner with us to investigate your networks and systems when requests are submitted to you by OUC or Law Enforcement.
Proactively search for cyber threats and use the latest practices to find malicious actors in your environment that have slipped past your initial endpoint security defenses.
Identify vulnerabilities in managed systems, evaluate the severity of risks, and take planned actions.
Safeguard your systems by having our Threat and Incident Management Team triage potential University network threats by evaluating inputs from many security, network, and system tools.
Pitt Digital Security is available to assist departments and schools in all IT security audit needs — including regulatory requests. Contact us for expert guidance in managing and executing audit processes through risk identification, evaluation, and mitigation.
IT security architecture and engineering can help you design and document key elements of your overall security program, which ensures that your department and users can understand and utilize methods for creating safe, collaborative digital environments. Pitt Digital Security will work closely with you to create a well-defined strategy that fits your needs and uses industry-leading best practices to enable your department’s security and success.
Plan and create your IT environment with security as a top priority.
Implement the proper tools and security measures for your needs.
Design and develop secure solutions that fit your unique work processes and data needs.