IT Security-Related Resources
IT security-related issues can be a serious problem. Use the resources below to report
problems or request exceptions. More resources will be added as they become available.
How to report a malware or virus infection
Please call or email the CHS Helpdesk with the following information if you suspect your computer is compromised:
- Your Name
- Location
- Computer Name
- IP Address
- Computer issues you are experiencing
- Keep this information readily available when contacting the helpdesk to speed up the
resolution
Blocked Content or Websites
Access to certain websites or online content may be restricted due to security policies,
compliance requirements, or to prevent exposure to malicious material. These blocks
help protect users, devices, and the broader network from threats such as malware,
phishing, or data leaks.
If you believe a site is mistakenly blocked or need access for legitimate business
purposes, please submit a ticket to the CHS Helpdesk with the following details:
How to request a firewall exception (Desktop and Edge)
Email the CHS Helpdesk with the following information
Desktop Firewall:
- Requestors name
- OKEY shortname
- Is this a personal or OSU owned device
- Computer name
- IP Address
- Physical location
- Service/Application
- Justification/reason for firewall exception
Edge Firewall:
- Requestors name
- Inside IP address or range
- Service (Example: HTTP Webserver (Port 80), HTTPS Webserver (Port 443))
- Outside IP address or range
- Action (Permit/Deny)
- Direction (In/Out)
- Sensitive Data (Yes/No)
- Justification/reason for firewall exception
Please provide any additional contact information along with any technical information
you believe will help to expedite your request.
New Software Requests
When introducing new software into the environment, IT must verify its security posture
to ensure it aligns with organizational standards and does not introduce vulnerabilities.
This review includes how the software handles data, authentication, network communications,
as well as well as how the software will be upgraded and maintained throughout its
life cycle.
Involving IT early in the software procurement process helps expedite approvals, confirm
compliance, and ensure proper setup and configuration.
Security Tips
FTC - How to Recognize and Avoid Phishing Scams
SOPHOS - 5 things you can do today to make Zooming safer
NIST - Telework Security Basics
NIST - Preventing Eavesdropping and Protecting Privacy on Virtual Meetings
IT security-related issues can be a serious problem. Use the resources below to report problems or request exceptions. More resources will be added as they become available.
How to report a malware or virus infection
Please call or email the CHS Helpdesk with the following information if you suspect your computer is compromised:
- Your Name
- Location
- Computer Name
- IP Address
- Computer issues you are experiencing
- Keep this information readily available when contacting the helpdesk to speed up the resolution
Blocked Content or Websites
Access to certain websites or online content may be restricted due to security policies, compliance requirements, or to prevent exposure to malicious material. These blocks help protect users, devices, and the broader network from threats such as malware, phishing, or data leaks.
If you believe a site is mistakenly blocked or need access for legitimate business purposes, please submit a ticket to the CHS Helpdesk with the following details:
How to request a firewall exception (Desktop and Edge)
Email the CHS Helpdesk with the following information
Desktop Firewall:
- Requestors name
- OKEY shortname
- Is this a personal or OSU owned device
- Computer name
- IP Address
- Physical location
- Service/Application
- Justification/reason for firewall exception
Edge Firewall:
- Requestors name
- Inside IP address or range
- Service (Example: HTTP Webserver (Port 80), HTTPS Webserver (Port 443))
- Outside IP address or range
- Action (Permit/Deny)
- Direction (In/Out)
- Sensitive Data (Yes/No)
- Justification/reason for firewall exception
Please provide any additional contact information along with any technical information you believe will help to expedite your request.
New Software Requests
When introducing new software into the environment, IT must verify its security posture to ensure it aligns with organizational standards and does not introduce vulnerabilities. This review includes how the software handles data, authentication, network communications, as well as well as how the software will be upgraded and maintained throughout its life cycle.
Involving IT early in the software procurement process helps expedite approvals, confirm compliance, and ensure proper setup and configuration.
Security Tips
FTC - How to Recognize and Avoid Phishing Scams
SOPHOS - 5 things you can do today to make Zooming safer
NIST - Telework Security Basics
NIST - Preventing Eavesdropping and Protecting Privacy on Virtual Meetings