Skip to main content

Health Sciences

Open Main MenuClose Main Menu

IT security-related issues can be a serious problem. Use the resources below to report problems or request exceptions. More resources will be added as they become available.

 

How to report a malware or virus infection

Please call or email the CHS Helpdesk with the following information if you suspect your computer is compromised:

  • Your Name
  • Location
  • Computer Name
  • IP Address
  • Computer issues you are experiencing
  • Keep this information readily available when contacting the helpdesk to speed up the resolution

 

Blocked Content or Websites

Access to certain websites or online content may be restricted due to security policies, compliance requirements, or to prevent exposure to malicious material. These blocks help protect users, devices, and the broader network from threats such as malware, phishing, or data leaks.

 

If you believe a site is mistakenly blocked or need access for legitimate business purposes, please submit a ticket to the CHS Helpdesk with the following details:

 

How to request a firewall exception (Desktop and Edge)

Email the CHS Helpdesk with the following information

 

Desktop Firewall:

  • Requestors name
  • OKEY shortname
  • Is this a personal or OSU owned device
  • Computer name
  • IP Address
  • Physical location
  • Service/Application
  • Justification/reason for firewall exception

Edge Firewall:

  • Requestors name
  • Inside IP address or range
  • Service (Example: HTTP Webserver (Port 80), HTTPS Webserver (Port 443))
  • Outside IP address or range
  • Action (Permit/Deny)
  • Direction (In/Out)
  • Sensitive Data (Yes/No)
  • Justification/reason for firewall exception

Please provide any additional contact information along with any technical information you believe will help to expedite your request.

 

New Software Requests

When introducing new software into the environment, IT must verify its security posture to ensure it aligns with organizational standards and does not introduce vulnerabilities. This review includes how the software handles data, authentication, network communications, as well as well as how the software will be upgraded and maintained throughout its life cycle.

 

Involving IT early in the software procurement process helps expedite approvals, confirm compliance, and ensure proper setup and configuration.

 

Security Tips

FTC - Coronavirus Scams

FTC - How to Recognize and Avoid Phishing Scams

SOPHOS - 5 things you can do today to make Zooming safer 

NIST - Telework Security Basics

NIST - Preventing Eavesdropping and Protecting Privacy on Virtual Meetings

MENUCLOSE