Skip to site content

Websites & Videos

Log4j Vulnerability: What It Is, Why It Matters, What You Should Do
Log4j is a popular software library that public and private organizations of all sizes and across many industries use to log security and performance information in services, websites, and applications. Software developers have discovered a number of vulnerabilities, including ones that allow a remote attacker to take control of an affected system and another that can deny access to system users. The Log4j Vulnerability Site explains these vulnerabilities and what can be done.

Your Mobile Device and Health Information Privacy and Security Videos
The Office of the National Coordinator for Health Information Technology (ONC) and the the Office for Civil Rights (OCR) have created videos on securing mobile devices that can be found here: Your Mobile Device and Health Information Privacy and SecurityExit Disclaimer: You Are Leaving www.ihs.gov .

A graphic showing cybersecurity issues.

Useful References

  1. Area IT Service Desk
    Links to local IT support.
  2. Training Resources
    Documents, infographics, websites, and videos created by DIS to help users learn more about cybersecurity.
  3. ISSA Training Site
    A direct link to IHS's mandatory security training site.
  4. NIST Glossary Exit Disclaimer: You Are Leaving www.ihs.gov 
    A link to a glossary of terms from NIST's cybersecurity- and privacy-related publications.