Traveling Safely with Technology
Description: This article has been migrated to Safe Computing website.
» Subjects: ,

Risk Assessment Program FAQ
Description: What is a Risk Assessment? A risk assessment is the systematic process of evaluating the potential for loss or harm (risks). The assessment includes 1) reviewing the security measures implemented to assure that those measures (i.e., controls) reduce risk, and 2) developing a plan to treat any remaining risk (i.e. acceptance, mitigation, avoidance, transference). The […]
» Subjects: , , » Tags: , ,

UNC-Chapel Hill Affiliate Computing Best Practices* (Onyen Restricted)
Description: -
» Subjects: ,

How to enable a firewall on Windows and Mac OS X?
Description: To protect the campus network from the spread of viruses and malware, we require all computers to have a firewall installed, enabled and configured to block malicious traffic. A firewall provides a layer of protection between your computer and the internet. It serves as a barrier and can help defend against someone attempting to access […]
» Subjects: , , , » Tags: , ,

Update Your Software Regularly
Description: As a best practice the University recommends that you keep your software up to date on a regular basis.  This software includes, Operating Systems, Web Browsers, and Web applications/ web browser plug-ins.  Leaving these unattended can leave them open to attacks and breach in sensitive information. How to update you operating system: Windows Turn on […]
» Subjects: , , , » Tags: , , ,

Sensitive Information (Onyen Restricted)
Description: -
» Subjects: , , » Tags: , ,

Securely Removing Data from Computer and Electronic Storage Devices
Description: This article has been migrated/consolidated into Safe Computing. Direct Link:
» Subjects: , » Tags:

Securing your computer on the UNC network
Description: This page has been consolidated/relocated to Safe Computing: Direct Link:
» Subjects: , » Tags: , , ,

Best Practices for Email Attachments
Description: About Email Attachments A popular use of email is to distribute computer files (e.g., text files, documents, spreadsheets, PDFs, etc.). This is accomplished by “attaching” a file to an email message and then sending the file with the message to a recipient. Virtually any kind of computer file can be attached to an email message […]
» Subjects: ,

Dangers of file sharing programs
Description: Table of Contents Some common misconceptions about BitTorrent Useful information about filesharing and what can precipitate a copyright violation Helpful Links Some common misconceptions about BitTorrent I used encryption, so my activities will be undetectable to outside sources.Encrypting BitTorrent files will not protect you from detection by copyright holders and their representatives. While encryption may […]
» Subjects: ,