Search20 Results

Overview, FAQ, and change log of the data security standards
Third party breach information due to MoveIT software zero day affects current and former U of I affiliates.
Information to help you identify different classifications of data, which may require different technical controls.
Setting up a VPN for Windows.
This article describes how to properly report a phishing message.
This article explains the why and how for implementing different security measures for your account and computer.
Setting up a security profile with a minimum of 3 questions and 1 contact enables the reset of a forgotton or compromised password.
Follow these tips to help keep your data, accounts, and the university secure!
This article explains the process used when identifying the risks associated with a particular product or service for the intended use.
This article describes how to manage and dispose of records, as well as the security implications of the included processes.
This tutorial explains how to obtain a license and install Sophos Home.
This article contains resources and information to enroll and implement multi-factor authentication at U of I.
Remain vigilant this holiday season for hackers, scammers, and online thieves trying to steal your personal and financial information while you shop. To help keep your information secure, please consider the following.
Cyber Security Tips for traveling abroad
Essential Cyber Security Tips for UI Employees