
Outcomes
- Increase secure remote access to systems and data.
- Protect applications hosting sensitive data against unauthorized access.
- Meet the University’s Information Security Control Standard as endorsed by the Information Security Council.
- Protect user and admin accounts against compromise.
- Reduce risk of weak passwords being exploited by threat actors.
