Search17 Results

This article describes how to manage and dispose of records, as well as the security implications of the included processes.
Essential Cyber Security Tips for UI Employees
This article contains information about Whole Disk Encryption at U of I.
This article explains the process used when identifying the risks associated with a particular product or service for the intended use.
Information to help you identify different classifications of data, which may require different technical controls.
This article describes how to properly report a phishing message.
Remain vigilant this holiday season for hackers, scammers, and online thieves trying to steal your personal and financial information while you shop. To help keep your information secure, please consider the following.
Cyber Security Tips for traveling abroad
This article explains the why and how for implementing different security measures for your account and computer.
In the case that a user forgets the Power-On-Authentication passphrase that they set when encryption was enabled, this tutorial will demonstrate how a recovery key can be generated so that they can boot their OS X Apple computer and reset their passphrase.
This tutorial goes over how to set up the UI Cisco Any Connect VPN onto a Linux machine.
This tutorial explains how to install Sophos Home on Windows.
This is a tutorial on installing Sophos AntiVirus Home onto a personal Mac/Apple computer.
Setting up a security profile with a minimum of 3 questions and 1 contact enables the reset of a forgotton or compromised password.
Setting up a VPN for Windows.