Search21 Results
- Knowledge Base
- Data Security & Records
This article explains the process used when identifying the risks associated with a particular product or service for the intended use.
- Knowledge Base
- Data Security & Records
Information to help you identify different classifications of data, which may require different technical controls.
- Knowledge Base
- Data Security & Records
- Knowledge Base
- WiFi & Connectivity
- Knowledge Base
- Data Security & Records
In the case that a user forgets the Power-On-Authentication passphrase that they set when encryption was enabled, this tutorial will demonstrate how a recovery key can be generated so that they can boot their OS X Apple computer and reset their passphrase.
- Knowledge Base
- Data Security & Records
Setting up VPN for Android.
- Knowledge Base
- Data Security & Records
This tutorial explains how to set up VPN for an iOS device.
- Knowledge Base
- Data Security & Records
This tutorial goes over how to set up the UI Cisco Any Connect VPN onto a Linux machine.
- Knowledge Base
- Data Security & Records
This tutorial explains how to obtain a license and install Sophos Home.
- Knowledge Base
- Data Security & Records
- Records Center
This article describes how to manage and dispose of records, as well as the security implications of the included processes.
- Knowledge Base
- Data Security & Records
This article explains the why and how for implementing different security measures for your account and computer.
- Knowledge Base
- Accounts, Groups & Passwords
Setting up a security profile with a minimum of 3 questions and 1 contact enables the reset of a forgotton or compromised password.
- Knowledge Base
- Data Security & Records
This article contains information about Whole Disk Encryption at U of I.
- Knowledge Base
- Data Security & Records
Cyber Security Tips for traveling abroad
- Knowledge Base
- Data Security & Records
Essential Cyber Security Tips for UI Employees