Support documentationStep-by-step instructions on device registrationHow to register
Availability and accessFind out who can register devices and access the HMS networkEligibility OS support
Anyone who has an HMS account ID can access the registration pages to register their devices. You must be on campus or connect to VPN to access the smart device registration page, but you can access the general wired and wireless registration pages from anywhere.
Devices with supported operating systems will usually be given full access to both the local HMS intranet and the public internet. Those with unsupported operating systems can only connect to the public internet over wireless networks. If you are not running a supported operating system and would like help upgrading, you can contact HMS IT support.
PrivacyWhat HMS IT tracks and whyData logged SMS software
Registering your device will enable HMS IT systems to confirm that you are a member of the HMS community who is eligible for access and that your device’s technical specifications—such as the type of operating system—do not pose a threat to the HMS network.
Registered devices may also have required software installed that will scan your device to confirm that security requirements for the device are met.
Impact of cyberattacksLearn how data breaches affect everyoneImpacts to you and HMS
Cyberattacks and data breaches threaten organizations and individuals in many ways. These impacts include:
- Theft of intellectual property and research
- Exposure of private information
- Disruption of work when systems are shut down because of an attack
Besides damaging trust in systems that have been affected, cyberattacks can have a significant financial impact on organizations. According to Statista, the average cost of a data breach in 2020 was close to $8.64 million, a 10% rise over the last five years.
Cost (USD, in millions)
As a member of the HMS community, you can help keep the network secured and protected from outside threats. Registering your device is an important step in protecting yourself and the community.
Relevant security policiesReview official security policyPolicies and practices