Carolina CloudApps: Access to Firewall Protected Resources (Onyen Restricted)
Description: -
» Subjects: » Tags: , , , , , ,

2-Step Verification for Duo
Description: The University recommends registering more than one device. For example, you could register both a mobile device and a landline. If you only register one device and do not have it with you, then you may be unable to access your sensitive information or application. Security Tips: if you have access to privileged systems you […]
» Subjects: , , , , , , , , » Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

UNC Chapel Hill Website Best Practices
Description: Introduction Before planning of a new website, schools, departments, centers, projects, and labs should evaluate one of UNC’s managed solutions for creating websites. Recent incidents at UNC-CH have highlighted the complexities and workload required to properly administer a website and prevent abuse. UNC managed solutions include: Centrally-hosted and managed WordPress Sites.unc.edu Web.unc.edu School of Medicine-hosted […]
» Subjects: » Tags: , , , , , , , , , , , , ,

How to Create A Secure Password
Description: What is a long and strong (secure) password? Your password is a significant defense against cyber-criminals, making it imperative that you choose a long and strong password that cannot be easily cracked. This is especially important for administrator-level accounts. The System Administration, Network, and Security (SANS) Institute recommends certain guidelines for choosing an effective password. […]
» Tags: , ,

Establishing a New Credit Card Merchant Account
Description: There is no excerpt because this is a protected post.
» Tags: , ,

How to Secure Linux
Description: This document is intended to provide basic and mid-level tips for securing your Linux system. These tips are designed to apply to most Linux distributions however you may need to consult with help documentation for your particular distribution if some of the commands do not work for you. General Principles Use a strong password (mix numbers, capital letters, and symbols) with length of eight […]
» Tags: ,

Microsoft Security Essentials Client Overview
Description: The Microsoft Security Essentials (MSE) client is the current recommended Antivirus/Malware application for personally-owned computers.  This application is a Non-Managed client; an overview of the client is offered below. For University-owned computers, Microsoft System Endpoint Protection is recommended. Please visit Microsoft System Center Endpoint Protection for more information. General Overview The Microsoft Security Essentials has four […]
» Subjects: , , , , , » Tags: , , , ,

Installing Microsoft Security Essentials
Description: The University recommends that Microsoft Security Essentials be installed on any personal computer used by Faculty, Staff, or Students.  For University-owned computers, Microsoft System Endpoint Protection is recommended.   Please follow the instructions below to install Microsoft Security Essentials. If you are a Windows 8.1 or Windows 10 user then either of those come with […]
» Subjects: , , , , , » Tags: ,

Protecting Your Sensitive Information
Description: The encryption solutions mentioned in this article deal exclusively with files and folders, not disks. For more information on whole disk encryption please contact ITS Information Security. File/folder encryption solutions handle copies of encrypted files differently. There are cases where one could unintentionally decrypt files when they are e-mailed, backed up, copied to another disk, […]
» Subjects: , » Tags: , , , , ,

Securing your computer on the UNC network
Description: For perspective: You should consider that once you connect your computer to the Internet, the entire Internet (and every user on the Internet) connects to your computer. If you are using a campus network connection to the Internet, then the security of your computers should be one of your concerns. Just as the campus police […]
» Subjects: , » Tags: , , ,