Vishing: Phone Phishing
Description: What is vishing? Vishing (phone phishing) is the “practice of eliciting information or attempting to influence action via the telephone.” Like email phishing, once the visher has your information they can steal your identity to obtain access to your bank account, credit card, or even your paycheck. How do you identify a vish? Like email […]
» Subjects: ,

How does my UNC-CH laptop get patched? (Mac, Windows)
Description: Most University owned Windows OS devices that have been joined to the active directory domain (ad.unc.edu) are on a managed update schedule, but in some cases, you can still run updates outside of the regularly scheduled service window.  This is critical for systems that are typically off of the university network and only periodically check […]
» Subjects: , ,

2-Step for Office 365 (Heelmail)
Description:
» Subjects: , , , » Tags: , , , ,

Disable / Enable Secure Boot
Description: Description You must disable Secure Boot in the BIOS in order to deploy the CCI images using the Image Ultra boot media. The steps below will guide you through disabling or enabling Secure Boot and UEFI in the BIOS. IMPORTANT: Secure Boot is an important security feature and should be re-enabled after the Image Ultra […]
» Subjects: , ,

Sensitive Information Terms of Use Agreement
Description:
» Subjects: , , , » Tags: ,

Auto-forwarding of email to untrusted email domains
Description: Policy clarification for all UNC-Chapel Hill affiliates regarding email accounts used to conduct University business UNC-Chapel Hill affiliates may have their email auto-forward removed if their email account is currently being forwarded to an email system that is not run by UNC-Chapel Hill or is not among systems that have agreements in place with UNC-Chapel […]
» Subjects: , , , » Tags: , , , ,

Risk Assessment Program FAQ
Description: What is a Risk Assessment? A risk assessment is the systematic process of evaluating the potential for loss or harm (risks). The assessment includes 1) reviewing the security measures implemented to assure that those measures (i.e., controls) reduce risk, and 2) developing a plan to treat any remaining risk (i.e. acceptance, mitigation, avoidance, transference). The […]
» Subjects: , , » Tags: , ,

Instructions on using Qualys to scan your systems (Onyen Restricted)
Description: -
» Subjects: » Tags: , ,

2-Step Verification for Duo
Description: The University recommends registering more than one device. For example, you could register both a mobile device and a landline. If you only register one device and do not have it with you, then you may be unable to access your sensitive information or application. Security Tips: if you have access to privileged systems you […]
» Subjects: , , , , , , , , » Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

UNC Chapel Hill Website Best Practices
Description: Introduction Before planning of a new website, schools, departments, centers, projects, and labs should evaluate one of UNC’s managed solutions for creating websites. Recent incidents at UNC-CH have highlighted the complexities and workload required to properly administer a website and prevent abuse. UNC managed solutions include: Centrally-hosted and managed WordPress Sites.unc.edu Web.unc.edu School of Medicine-hosted […]
» Subjects: » Tags: , , , , , , , , , , , , ,