Anti-virus, multi-factor authentication, whole disk encryption, firewall, SSL certificates, data security issues, and Records Center storage.
Storage locations approved by OIT for storage of university data, consistent with U of I policies and standards.
A listing of technology security and compliance best practices.
Third party breach information due to MoveIT software zero day affects current and former U of I affiliates.
1Password onboarding information.
Under Idaho Law, TikTok has been banned on university devices and networks. These messages or errors may be seen by users trying to access TikTok.
Follow these tips to help keep your data, accounts, and the university secure!
Answers to frequently asked questions about email phishing.
Further protect yourself and our campus with additional security training on using email on mobile devices, avoiding dangerous links, and more.
This guide describes the current settings enforced for High Risk data access on macOS, Windows, iOS, and Android.
Instructions on erasing hard disk drives.
Instructions for erasing an iOS device.
Instructions on erasing solid-state drives.
This tutorial explains how to obtain a license and install Sophos Home.
Instructions for user setup of Filevault encryption on macOS.
How to check and see that Chrome has the latest updates.
Supplemental Terms of Use for International Travel information
Instructions on securely erasing an Android devie
Information to help you identify different classifications of data, which may require different technical controls.
Remote reboot instructions for BitLocker users.
Reset a forgotten BitLocker password when the device is managed only by Intune.
Instructions for user setup of BitLocker PIN on Windows.
Guidelines for configuring HTTP logging consistent with IT standards
NPD 2024 Breach information
Remain vigilant this holiday season for hackers, scammers, and online thieves trying to steal your personal and financial information while you shop. To help keep your information secure, please consider the following.
What to do about spam. Some people and business indiscriminately send large amounts of unsolicited commercial email (UCE). In recent years, spam content has expanded to include offensive advertising, malicious content and computer viruses.
Guidelines to comply with Logon Banner IT standards for APM 30.11.
Essential Cyber Security Tips for UI Employees
Reduce your chances of falling victim to a romance scam.
Cyber Security Tips for traveling abroad
This article explains the process used when identifying the risks associated with a particular product or service for the intended use.
Resources for victims of identity theft.
In the case that a user forgets the Power-On-Authentication passphrase that they set when encryption was enabled, this tutorial will demonstrate how a recovery key can be generated so that they can boot their OS X Apple computer and reset their passphrase.
Information about the acceptable use policy for eduroam.
Information about and helpful tips on identifying phishing emails.
This article contains information about Whole Disk Encryption at U of I.
Answers to frequently asked questions about Whole Disk Encryption.
Malware removal is not an effective way to ensure an infected computer is clean. The best way to approach malware infections is to format and re-image the computer.
This article explains the why and how for implementing different security measures for your account and computer.
Mitigations for use of temporary employees handling high risk data.
This document describes the process to change the WDE passphrase (also known as encryption password, boot password or PIN).