Search20 Results

This article describes how to manage and dispose of records, as well as the security implications of the included processes.
The installation of Sophos SafeGuard will take place automatically, but encryption will not take place until a passphrase is set. This tutorial will demonstrate how to begin the encryption process on Windows.
The installation of Sophos SafeGuard will take place automatically, but encryption will not take place until a passphrase is set. This tutorial will demonstrate how to begin the encryption process on OS X.
This article explains the process used when identifying the risks associated with a particular product or service for the intended use.
This article describes how to properly report a phishing message.
Remain vigilant this holiday season for hackers, scammers, and online thieves trying to steal your personal and financial information while you shop. To help keep your information secure, please consider the following.
Information to help you identify different classifications of data, which may require different technical controls.
This article explains the why and how for implementing different security measures for your account and computer.
This article contains information about Whole Disk Encryption at U of I.
In the case that a user forgets the Power-On-Authentication passphrase that they set when encryption was enabled, this tutorial will demonstrate how a recovery key can be generated so that they can boot their Windows computer and reset their passphrase.
In the case that a user forgets the Power-On-Authentication passphrase that they set when encryption was enabled, this tutorial will demonstrate how a recovery key can be generated so that they can boot their OS X Apple computer and reset their passphrase.
Cyber Security Tips for traveling abroad
Essential Cyber Security Tips for UI Employees
This tutorial goes over how to set up the UI Cisco Any Connect VPN onto a Linux machine.
This tutorial explains how to install Sophos Home on Windows.