Skip to main content

Information Security

The University Information Security Office (UISO) is responsible for the overall direction of information security functions relating to Fordham University. Subscribe to our blog, Fordham SecureIT, follow us on Twitter (@FordhamSecureIT), and like our Facebook Page, for updates on recent phishing activity and other security issues affecting the Fordham community.

Contact the UISO directly at

Risk management is everyone's responsibility. Lower your risk by taking our free, self-paced online information security awareness training for employees, Information Security Awareness. To access the course, log in to the Terranova app from the My Apps tab in the portal,

Ransomware: Online Security Threat 
Ransomware is a malicious cyberattack that denies users access to their computer system or data. During an attack, the cyberattacker demands a ransom fee from the victim within a specific period of time. If payment is not received, the cyberattacker permanently locks or deletes the ransomed information. Paying the ransom, however, does not guarantee that the attacker will release the victim's data. In some cases, attackers may request more money even after the ransom has been paid. Protect yourself against a ransomware threat. Make sure your computer system, software applications, and antivirus software are all up to date and receive regularly scheduled backups.
Our post "Ransomware Awareness" offers a visual example of ransomware and more information about this threat. 

Report a Security Incident
To report an IT security incident, please contact IT Customer Care or select Information Technology via the Fordham University Integrity Hotline

UISO Key Responsibilities

  • Develop and maintain security architecture
  • Oversee IT Security-related risk management
  • Security of enterprise-wide applications 
  • Promote quality and integrity, and build a culture of information security throughout the University
  • Develop information security policies
  • Educate the University concerning the implications of legislative requirements
  • Identify security goals and objectives  
  • Work with the University Physical Safety and Security Office to enhance the University’s physical security
  • Work with University General Counsel in maintaining privacy within the University for faculty, students and staff.
  • Work with University-wide Information Risk Management Board to provide guidance and advocacy on information security standards and security investments.  

Important Form

  • Vulnerability Assessment Request: Use the Tech Help tab at to make this request.

UISO Key Services

  • Vulnerability assessment, penetration testing, forensics, and code analysis
  • User security awareness
  • Security access requests
  • Authorizations
  • Security implementations
  • Compliance monitoring
  • Network traffic security monitoring