Search20 Results

This article describes how to properly report a phishing message.
Remain vigilant this holiday season for hackers, scammers, and online thieves trying to steal your personal and financial information while you shop. To help keep your information secure, please consider the following.
Information to help you identify different classifications of data, which may require different technical controls.
This article explains the why and how for implementing different security measures for your account and computer.
This article contains information about Whole Disk Encryption at U of I.
In the case that a user forgets the Power-On-Authentication passphrase that they set when encryption was enabled, this tutorial will demonstrate how a recovery key can be generated so that they can boot their Windows computer and reset their passphrase.
In the case that a user forgets the Power-On-Authentication passphrase that they set when encryption was enabled, this tutorial will demonstrate how a recovery key can be generated so that they can boot their OS X Apple computer and reset their passphrase.
Cyber Security Tips for traveling abroad
Essential Cyber Security Tips for UI Employees
The installation of Sophos SafeGuard will take place automatically, but encryption will not take place until a passphrase is set. This tutorial will demonstrate how to begin the encryption process on OS X.
This tutorial goes over how to set up the UI Cisco Any Connect VPN onto a Linux machine.
This article explains the process used when identifying the risks associated with a particular product or service for the intended use.
This tutorial explains how to install Sophos Home on Windows.
This is a tutorial on installing Sophos AntiVirus Home onto a personal Mac/Apple computer.
The installation of Sophos SafeGuard will take place automatically, but encryption will not take place until a passphrase is set. This tutorial will demonstrate how to begin the encryption process on Windows.