Anti-virus, multi-factor authentication, whole disk encryption, firewall, SSL certificates, data security issues, and Records Center storage.
Storage locations approved by OIT for storage of university data, consistent with U of I policies and standards.
A listing of technology security and compliance best practices.
Third party breach information due to MoveIT software zero day affects current and former U of I affiliates.
1Password onboarding information.
Under Idaho Law, TikTok has been banned on university devices and networks. These messages or errors may be seen by users trying to access TikTok.
Follow these tips to help keep your data, accounts, and the university secure!
This guide describes the current settings enforced for High Risk data access on macOS, Windows, iOS, and Android.
This article explains how to change your BitLocker PIN.
Instructions on erasing hard disk drives.
Instructions for erasing an iOS device.
Instructions on erasing solid-state drives.
This tutorial explains how to obtain a license and install Sophos Home.
Instructions for user setup of Filevault encryption on macOS.
How to check and see that Chrome has the latest updates.
Supplemental Terms of Use for International Travel information
Instructions on securely erasing an Android devie
Information to help you identify different classifications of data, which may require different technical controls.
Remote reboot instructions for BitLocker users.
Reset a forgotten BitLocker password when the device is managed only by Intune.
Instructions for user setup of BitLocker PIN on Windows.
Guidelines for configuring HTTP logging consistent with IT standards
Identifying ROT (Redundant, Obsolete, Trivial) data and tips for managing it
NPD 2024 Breach information
Resources for victims of identity theft and assistance to help avoid becoming a victim.
Frauds and scams have become sophisticated, costing Americans billions of dollars annually. Understanding the most prevalent schemes and learning how to protect yourself is essential for financial and personal security
Remain vigilant this holiday season for hackers, scammers, and online thieves trying to steal your personal and financial information while you shop. To help keep your information secure, please consider the following.
What to do about spam. Some people and business indiscriminately send large amounts of unsolicited commercial email (UCE). In recent years, spam content has expanded to include offensive advertising, malicious content and computer viruses.
Guidelines to comply with Logon Banner IT standards for APM 30.11.
Essential Cyber Security Tips for UI Employees
Reduce your chances of falling victim to a romance scam.
Cyber Security Tips for traveling abroad
This article explains the process used when identifying the risks associated with a particular product or service for the intended use.
In the case that a user forgets the Power-On-Authentication passphrase that they set when encryption was enabled, this tutorial will demonstrate how a recovery key can be generated so that they can boot their OS X Apple computer and reset their passphrase.
Information about and helpful tips on identifying phishing emails.
This article contains information about Whole Disk Encryption at U of I.
Malware removal is not an effective way to ensure an infected computer is clean. The best way to approach malware infections is to format and re-image the computer.
This article explains the why and how for implementing different security measures for your account and computer.
Mitigations for use of temporary employees handling high risk data.