2-Step Verification (Duo) (Onyen Restricted)
Description: -
» Subjects: , , , , , , » Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Duo Security Guide for UNC-CH Users
Description: Background Authentication is the act of proving you are who you say you are. You can think of it as “proving your identity.” A traditional form of authentication is having a user name and password. Presumably, only you know the password associated with your user account. Unfortunately, this “single-factor” (in this case, something that you […]
» Subjects:

Safety and Security for the Business Professional Traveling Abroad
Description: FBI-Business-Travel-Brochure-Best-Practices
» Subjects: » Tags: , , , , , ,

Information Security Recommendations for Faculty Traveling Abroad
Description: The Higher Education Information Security Council (HEISC) Information Security Guide includes a page of Security Tips for Traveling Abroad with institutional resources, as well as government resources and relevant articles. See Security Tips for Traveling Abroad.   Note: The FBI has a brochure, Safety and Security for the Business Professional Traveling Abroad, encouraging business travelers to […]
» Subjects: » Tags: , , , , , ,

UNC Chapel Hill Website Best Practices
Description: Introduction Before planning of a new website, schools, departments, centers, projects, and labs, should evaluate one of UNC’s managed solutions for creating websites Recent incidents at UNC-CH have highlighted the complexities and workload required to properly administer a website. UNC managed solutions include: Centrally-hosted and managed WordPress Sites.unc.edu Web.unc.edu School of Medicine-hosted and managed Plone […]
» Subjects: » Tags: , , , , , , , , , , , , ,

Recognizing and Reporting Fraudulent Emails
Description: This document describes the most common types of fraudulent email and provides you with recommendations on what to do if when you receive one. The two most common types of fraudulent emails are: Phishing emails Spam emails What are Phishing Emails? Phishing emails are malicious messages that attempt to steal your sensitive information, such as your passwords, […]
» Subjects: , » Tags: , , ,

Caught a Phish?
Description: First, make sure the phish isn’t just spam. If it is a phishing message, use UNC’s Phish Alerts page to see if it has already been reported. If it hasn’t been reported yet, please forward the message as an attachment to phish@unc.edu.
» Subjects: , » Tags: , , ,

Basic Security Awareness for End Users
Description: Basic security awareness for end users who work with sensitive, University-owned information is available at the following link: ITS Security Awareness. Log in to proceed to the Main Menu, where you will find information about the training and the accompanying quiz, as well as links to the training module and to the quiz itself.
» Subjects: ,

UNC-Chapel Hill Affiliate Computing Best Practices* (Onyen Restricted)
Description: -
» Subjects: ,

Posters and Digital Signage for National Cyber Security Awareness Month 2015 (Onyen Restricted)
Description: -
» Subjects: