Skip to main content
Florida State University Home Florida State University Home

FSU | Information Technology Services

  • Webmail
  • Search FSU
  • Navigation

  • Home
  • Services
  • Cybersecurity
    • Phish Tank
    • Protect Yourself
    • Protect FSU
    • Standards
  • Research
    • Governance
    • RCC User Accounts
    • RCC Account Login
    • RCC Documentation
    • RCC Training
  • About ITS
    • Leadership
    • Planning
    • Initiatives
    • Partnerships
    • News
    • Publications
    • Metrics
    • Policies
    • Contact
  • Help
    • myFSU Service Center
    • Classroom Support
    • IT Support
    • Training
    • FAQs
  • Academics
  • Admissions
  • Research
  • Faculty
  • Students
  • Veterans
  • Support FSU
Information Technology Services

  • Home
  • Services
  • Cybersecurity
    • Phish Tank
    • Protect Yourself
    • Protect FSU
    • Standards
  • Research
    • Governance
    • RCC User Accounts
    • RCC Account Login
    • RCC Documentation
    • RCC Training
  • About ITS
    • Leadership
    • Planning
    • Initiatives
    • Partnerships
    • News
    • Publications
    • Metrics
    • Policies
    • Contact
  • Help
    • myFSU Service Center
    • Classroom Support
    • IT Support
    • Training
    • FAQs
Vulnerability Management Banner
  1. Home
  2. Cybersecurity
  3. Protect FSU
  4. Seminole Secure
  5. Vulnerability Management

Vulnerability Management

Cybersecurity vulnerabilities are defined as security flaws in software, hardware or configuration of IT resources that, if exploited, would result in a negative impact to the confidentiality, integrity or availability of FSU data, the network or IT resources and infrastructure.

Vulnerability management utilizes scanning to create an inventory of all systems and software connected to the FSU network and checks each item against known vulnerabilities to see if any items are susceptible to an attack. The tool proactively identifies security holes or weaknesses in a system or device and recommends fixes and countermeasures to implement before a threat occurs. Vulnerability management is a vital part of the university's IT security plan.

All FSU units are required to perform monthly scans of their systems and devices. Vulnerability management is required upon enrollment in the Seminole Secure program.

Onboarding

To coordinate onboarding and training please contact John Chap at jchap@fsu.edu.

Resources

Vulnerability Assessment

ITS service offering providing regular scans and recommendations for devices connected to the FSU network

More 

IT and Security Fundamentals

Detailed descriptions of various security requirements and concepts

More 

InsightVM Video

Video highlighting InsightVM vulnerability assessment tool

More 

Support

If you have questions or need assistance with Vulnerability Management, please contact ITS at its-security@fsu.edu.

  • Contact Us
    •    FSU Service Status
    •   myFSU Service Center
    •   850-644-4357
    •  Chat
    •   M-F 8AM-5PM
  • Students
  • Faculty
  • FSU ITS
  •   Staff  
  •  IT Pros 
  •  Facebook
  •  Instagram
  •  Twitter
  •  YouTube
  •  LinkedIn

Information Technology Services · 1721 W Paul Dirac Drive · Tallahassee, FL 32310

© Florida State University
Tallahassee, FL 32306

FSU Directory Assistance
Questions or Comments

Privacy Policy
Copyright

  • Like Florida State on Facebook
  • Follow Florida State on Instagram
  • Follow Florida State on X
  • Follow Florida State on Youtube
  • Connect with Florida State on LinkedIn
  • More FSU Social Media

Cookie Preferences