Search21 Results

This article explains the process used when identifying the risks associated with a particular product or service for the intended use.
Information to help you identify different classifications of data, which may require different technical controls.
In the case that a user forgets the Power-On-Authentication passphrase that they set when encryption was enabled, this tutorial will demonstrate how a recovery key can be generated so that they can boot their OS X Apple computer and reset their passphrase.
Setting up VPN for Android.
This tutorial explains how to set up VPN for an iOS device.
This tutorial goes over how to set up the UI Cisco Any Connect VPN onto a Linux machine.
This tutorial explains how to obtain a license and install Sophos Home.
This article describes how to manage and dispose of records, as well as the security implications of the included processes.
This article explains the why and how for implementing different security measures for your account and computer.
Setting up a security profile with a minimum of 3 questions and 1 contact enables the reset of a forgotton or compromised password.
This article contains information about Whole Disk Encryption at U of I.
Cyber Security Tips for traveling abroad
Essential Cyber Security Tips for UI Employees