Search19 Results

Information to help you identify different classifications of data, which may require different technical controls.
This article describes how to properly report a phishing message.
This article describes how to manage and dispose of records, as well as the security implications of the included processes.
Setting up a security profile with a minimum of 3 questions and 1 contact enables the reset of a forgotton or compromised password.
This article contains information about Whole Disk Encryption at U of I.
Essential Cyber Security Tips for UI Employees
In the case that a user forgets the Power-On-Authentication passphrase that they set when encryption was enabled, this tutorial will demonstrate how a recovery key can be generated so that they can boot their Windows computer and reset their passphrase.
Setting up a VPN for Windows.
This article explains the process used when identifying the risks associated with a particular product or service for the intended use.
In the case that a user forgets the Power-On-Authentication passphrase that they set when encryption was enabled, this tutorial will demonstrate how a recovery key can be generated so that they can boot their OS X Apple computer and reset their passphrase.
This article explains the why and how for implementing different security measures for your account and computer.
The installation of Sophos SafeGuard will take place automatically, but encryption will not take place until a passphrase is set. This tutorial will demonstrate how to begin the encryption process on OS X.
The installation of Sophos SafeGuard will take place automatically, but encryption will not take place until a passphrase is set. This tutorial will demonstrate how to begin the encryption process on Windows.
Setting up VPN for Android.
This tutorial explains how to set up VPN for an iOS device.