Safety and Security for the Business Professional Traveling Abroad
Description: FBI-Business-Travel-Brochure-Best-Practices
» Subjects: » Tags: , , , , , ,

Information Security Recommendations for Faculty Traveling Abroad
Description: The Higher Education Information Security Council (HEISC) Information Security Guide includes a page of Security Tips for Traveling Abroad with institutional resources, as well as government resources and relevant articles. See Security Tips for Traveling Abroad.   Note: The FBI has a brochure, Safety and Security for the Business Professional Traveling Abroad, encouraging business travelers to […]
» Subjects: » Tags: , , , , , ,

UNC Chapel Hill Website Best Practices
Description: Introduction Before planning of a new website, schools, departments, centers, projects, and labs, should evaluate one of UNC’s managed solutions for creating websites Recent incidents at UNC-CH have highlighted the complexities and workload required to properly administer a website. UNC managed solutions include: Centrally-hosted and managed WordPress Sites.unc.edu Web.unc.edu School of Medicine-hosted and managed Plone […]
» Subjects: » Tags: , , , , , , , , , , , , ,

Basic Security Awareness for End Users
Description: Basic security awareness for end users who work with sensitive, University-owned information is available at the following link: ITS Security Awareness. Log in to proceed to the Main Menu, where you will find information about the training and the accompanying quiz, as well as links to the training module and to the quiz itself.
» Subjects: ,

UNC-Chapel Hill Affiliate Computing Best Practices* (Onyen Restricted)
Description: -
» Subjects: ,

How to enable a firewall on Windows and Mac OS X?
Description: To protect the campus network from the spread of viruses and malware, we require all computers to have a firewall installed, enabled and configured to block malicious traffic. A firewall provides a layer of protection between your computer and the internet. It serves as a barrier and can help defend against someone attempting to access […]
» Subjects: , , , » Tags: , ,

Update Your Software Regularly
Description: As a best practice the University recommends that you keep your software up to date on a regular basis.  This software includes, Operating Systems, Web Browsers, and Web applications/ web browser plug-ins.  Leaving these unattended can leave them open to attacks and breach in sensitive information. How to update you operating system: Windows Turn on […]
» Subjects: , , , » Tags: , ,

iPad Hardening Procedure
Description: The objective of this hardening procedure is to restrict the iPad to a single use device.  Please note that completing the steps outlined in this document will minimize the functionality of your iPad. Enable passcode lock Setting a passcode/password on your device enables data encryption.  Encrypting your device will prevent someone from accessing the data […]
» Subjects: , , , , » Tags: , ,

Computer Compromises
Description: What does “compromised” mean? “Compromised” is a nice way of saying that someone or something has maliciously broken into your computer without your knowledge or permission. It means that you can not trust the integrity of any file on your computer (including program files, image files, operating system files, etc.). You can not find out […]
» Subjects: , , » Tags: , ,

Sensitive Information (Onyen Restricted)
Description: -
» Subjects: , , » Tags: , ,