Contact ITS
Know the rules
All NAU employees and students should read and be familiar with the Appropriate Use of IT Resources.
Information Technology Policy Manual
Security Links
- Antivirus at NAU
- Affiliates at NAU
- BitLocker
- Civitas security roles
- Data privacy day
- Data protection training video
- Enable Two-Step Verification
- ePASS
- International travel information
- LOUIE security roles reference sheet
- Salesforce security roles
Information Security at NAU
Northern Arizona University is committed to preserving the availability, confidentiality, and integrity of its information resources while also preserving and nurturing the open, information-sharing requirements of its academic culture.
Resources and Services
The Information Security Office provides training and consulting to promote security awareness throughout the university.
Information Security Essentials

Required online training
Email phishing information

How to report a suspicious email
Information Security Program

Explore how ITS keeps online data secure
News
For a complete listing of all news articles, please visit our News page.
ITS at Employee Development Day
Employee Development Day on May 22 facilitated another successful day of broadening horizons and expanding networks. This annual event provides NAU employees the opportunity to learn from each other and is typically attended by more than 500 employees. This year, nine members of ITS presented on a variety of topics from using your Mac at NAU to self defense. Albert Sandoval: What makes a great leader? Amy Fouts and Jared Logan: ITS Checklist, with Disability Resources and Contracts, Purchasing, and…
Tax Season 2019
Tax season is one of the most notorious times of the year for online scams. As the final weeks of the season approach, please be aware that your personal, work, and school email accounts will likely be inundated with the latest scams. Every year, the Internal Revenue Service compiles a list of current scams to look out for. Current scams target tax professionals, payroll offices, and human resources in hopes of gaining access to an entire organization's personal information. One…