Information Security Awareness Training
Description: E-mail notifications are sent to members of the UNC community advising them of mandatory Information Security Awareness Training on an annual basis. The message will come from “Information Technology Services” with a return address of noreply@unc.edu.    The text of the message is below: “Members of the UNC community are required to complete an annual […]
» Subjects: , , ,

Traveling Safely with Technology
Description: This article has been migrated to Safe Computing website.
» Subjects: ,

Vishing: Phone Phishing
Description: This page has been migrated to Safe Computing: Direct Link: Vishing Help and FAQ
» Subjects: ,

2-Step for Office 365 (Heelmail)
Description:
» Subjects: , , , » Tags: , , , ,

Enable Secure Boot
Description: Description The recommended setting for deploying the CCI image is to enable Secure Boot and UEFI in the system BIOS. The steps below will guide you through enabling these settings. IMPORTANT: Secure Boot is an important security feature that should be enabled on computers that support it. 1. Enter the BIOS by pressing F1 prior […]
» Subjects: , , » Tags: , ,

Risk Assessment Program FAQ
Description: What is a Risk Assessment? A risk assessment is the systematic process of evaluating the potential for loss or harm (risks). The assessment includes 1) reviewing the security measures implemented to assure that those measures (i.e., controls) reduce risk, and 2) developing a plan to treat any remaining risk (i.e. acceptance, mitigation, avoidance, transference). The […]
» Subjects: , , » Tags: , ,

Instructions on using Qualys to scan your systems (Onyen Restricted)
Description: -
» Subjects: » Tags: , ,

2-Step Verification for Duo
Description: The University recommends registering more than one device. For example, you could register both a mobile device and a landline. If you only register one device and do not have it with you, then you may be unable to access your sensitive information or application. Security Tips: if you have access to privileged systems you […]
» Subjects: , , , , , , , , » Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Recognizing and Reporting Fraudulent Emails
Description: This document describes the most common types of fraudulent email and provides you with recommendations on what to do if when you receive one. The two most common types of fraudulent emails are: Phishing emails Spam emails What are Phishing Emails? Phishing emails are malicious messages that attempt to steal your sensitive information, such as your passwords, […]
» Subjects: , » Tags: , , ,

UNC-Chapel Hill Affiliate Computing Best Practices* (Onyen Restricted)
Description: -
» Subjects: ,