Computing & Communications Services

Lock

Security

Topic5Trusted Devices

Five concentric rings symbolise 5 levels of security. Trusted Devices is highlighted as the second ring from the circle centre.

Personal computers require ongoing management to keep them secure. Application and operating security patching, encryption, and endpoint security are essential components of our personal computer security strategy. This year we upgraded all CCS-supported Windows computers to Windows 10, we made improvements to our encryption strategy, and we added additional levels of advanced endpoint protection. We continue to work with our Apple-device clients to provide a secure Managed Desktops experience for this platform.