Auto-forwarding of email to untrusted email domains
Description: Policy clarification for all UNC-Chapel Hill affiliates regarding email accounts used to conduct University business UNC-Chapel Hill affiliates may have their email auto-forward removed if their email account is currently being forwarded to an email system that is not run by UNC-Chapel Hill or is not among systems that have agreements in place with UNC-Chapel […]
» Subjects: , , , » Tags: , , , ,

Instructions on using Qualys to scan your systems (Onyen Restricted)
Description: -
» Subjects: » Tags: , ,

2-Step Verification (Duo)
Description:  
» Subjects: , , , , , , » Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Safety and Security for the Business Professional Traveling Abroad
Description: FBI-Business-Travel-Brochure-Best-Practices
» Subjects: » Tags: , , , , , ,

Information Security Recommendations for Faculty Traveling Abroad
Description: The Higher Education Information Security Council (HEISC) Information Security Guide includes a page of Security Tips for Traveling Abroad with institutional resources, as well as government resources and relevant articles. See Security Tips for Traveling Abroad.   Note: The FBI has a brochure, Safety and Security for the Business Professional Traveling Abroad, encouraging business travelers to […]
» Subjects: » Tags: , , , , , ,

UNC Chapel Hill Website Best Practices
Description: Introduction Before planning of a new website, schools, departments, centers, projects, and labs should evaluate one of UNC’s managed solutions for creating websites. Recent incidents at UNC-CH have highlighted the complexities and workload required to properly administer a website and prevent abuse. UNC managed solutions include: Centrally-hosted and managed WordPress Sites.unc.edu Web.unc.edu School of Medicine-hosted […]
» Subjects: » Tags: , , , , , , , , , , , , ,

Recognizing and Reporting Fraudulent Emails
Description: This document describes the most common types of fraudulent email and provides you with recommendations on what to do if when you receive one. The two most common types of fraudulent emails are: Phishing emails Spam emails What are Phishing Emails? Phishing emails are malicious messages that attempt to steal your sensitive information, such as your passwords, […]
» Subjects: , » Tags: , , ,

Caught a Phish?
Description: First, make sure the phish isn’t just spam. If it is a phishing message, use UNC’s Phish Alerts page to see if it has already been reported. If it hasn’t been reported yet, please forward the message as an attachment to phish@unc.edu.
» Subjects: , » Tags: , , ,

Basic Security Awareness for End Users
Description: Basic security awareness for end users who work with sensitive, University-owned information is available at the following link: ITS Security Awareness. Log in to proceed to the Main Menu, where you will find information about the training and the accompanying quiz, as well as links to the training module and to the quiz itself.
» Subjects: ,

UNC-Chapel Hill Affiliate Computing Best Practices* (Onyen Restricted)
Description: -
» Subjects: ,