Microsoft 2-Step Verification (MFA)
Description:
» Subjects: , , , » Tags: , , , ,

Disable / Enable Secure Boot
Description: Description You must disable Secure Boot in the BIOS in order to deploy the CCI images using the Image Ultra boot media. The steps below will guide you through disabling or enabling Secure Boot and UEFI in the BIOS. IMPORTANT: Secure Boot is an important security feature and should be re-enabled after the Image Ultra […]
» Subjects: , ,

Sensitive Information Terms of Use Agreement
Description:
» Subjects: , , , » Tags: ,

Auto-forwarding of email to untrusted email domains
Description: Policy clarification for all UNC-Chapel Hill affiliates regarding email accounts used to conduct University business UNC-Chapel Hill affiliates may have their email auto-forward removed if their email account is currently being forwarded to an email system that is not run by UNC-Chapel Hill or is not among systems that have agreements in place with UNC-Chapel […]
» Subjects: , , , » Tags: , , , ,

Risk Assessment Program FAQ
Description: What is a Risk Assessment? A risk assessment is the systematic process of evaluating the potential for loss or harm (risks). The assessment includes 1) reviewing the security measures implemented to assure that those measures (i.e., controls) reduce risk, and 2) developing a plan to treat any remaining risk (i.e. acceptance, mitigation, avoidance, transference). The […]
» Subjects: , , » Tags: , ,

Instructions on using Qualys to scan your systems (Onyen Restricted)
Description: -
» Subjects: » Tags: , ,

2-Step Verification (Duo)
Description: The University recommends registering more than one device. For example, you could register both a mobile device and a landline. If you only register one device and do not have it with you, then you may be unable to access your sensitive information or application. Security Tips: Don’t give out your passcode(s) to anyone; treat […]
» Subjects: , , , , , , , , » Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

UNC Chapel Hill Website Best Practices
Description: Introduction Before planning of a new website, schools, departments, centers, projects, and labs should evaluate one of UNC’s managed solutions for creating websites. Recent incidents at UNC-CH have highlighted the complexities and workload required to properly administer a website and prevent abuse. UNC managed solutions include: Centrally-hosted and managed WordPress Sites.unc.edu Web.unc.edu School of Medicine-hosted […]
» Subjects: » Tags: , , , , , , , , , , , , ,

Recognizing and Reporting Fraudulent Emails
Description: This document describes the most common types of fraudulent email and provides you with recommendations on what to do if when you receive one. The two most common types of fraudulent emails are: Phishing emails Spam emails What are Phishing Emails? Phishing emails are malicious messages that attempt to steal your sensitive information, such as your passwords, […]
» Subjects: , » Tags: , , ,

UNC-Chapel Hill Affiliate Computing Best Practices* (Onyen Restricted)
Description: -
» Subjects: ,