Risk Assessment Program FAQ
Description: What is a Risk Assessment? A risk assessment is the systematic process of evaluating the potential for loss or harm (risks). The assessment includes 1) reviewing the security measures implemented to assure that those measures (i.e., controls) reduce risk, and 2) developing a plan to treat any remaining risk (i.e. acceptance, mitigation, avoidance, transference). The […]
» Subjects: , , » Tags: , ,

UNC Chapel Hill Website Best Practices
Description: Introduction Before planning of a new website, schools, departments, centers, projects, and labs should evaluate one of UNC’s managed solutions for creating websites. Recent incidents at UNC-CH have highlighted the complexities and workload required to properly administer a website and prevent abuse. UNC managed solutions include: Centrally-hosted and managed WordPress Sites.unc.edu Web.unc.edu School of Medicine-hosted […]
» Subjects: » Tags: , , , , , , , , , , , , ,

UNC-Chapel Hill Affiliate Computing Best Practices* (Onyen Restricted)
Description: -
» Subjects: ,

How to enable a firewall on Windows and Mac OS X?
Description: To protect the campus network from the spread of viruses and malware, we require all computers to have a firewall installed, enabled and configured to block malicious traffic. A firewall provides a layer of protection between your computer and the internet. It serves as a barrier and can help defend against someone attempting to access […]
» Subjects: , , , » Tags: , ,

Sensitive Information (Onyen Restricted)
Description: -
» Subjects: , , » Tags: , ,

ClamX Antivirus
Description: The University’s ITS Security has released the new Antivirus Software for Mac OS X users. The software is called ClamX Antivirus. The software is an open source application that will scan your system similar to Symantec Antivirus used by the University. A version of the ClamX Antivirus can be downloaded from Clamxav site. Installation Instructions Please view the installation instructions […]
» Subjects: , , , ,

Protecting Your Sensitive Information
Description: The encryption solutions mentioned in this article deal exclusively with files and folders, not disks. For more information on whole disk encryption please contact ITS Information Security. File/folder encryption solutions handle copies of encrypted files differently. There are cases where one could unintentionally decrypt files when they are e-mailed, backed up, copied to another disk, […]
» Subjects: , » Tags: , , , , ,

Securing your computer on the UNC network
Description: For perspective: You should consider that once you connect your computer to the Internet, the entire Internet (and every user on the Internet) connects to your computer. If you are using a campus network connection to the Internet, then the security of your computers should be one of your concerns. Just as the campus police […]
» Subjects: , » Tags: , , ,

Best Practices for Email Attachments
Description: About Email Attachments A popular use of email is to distribute computer files (e.g., text files, documents, spreadsheets, PDFs, etc.). This is accomplished by “attaching” a file to an email message and then sending the file with the message to a recipient. Virtually any kind of computer file can be attached to an email message […]
» Subjects: ,

Dangers of file sharing programs
Description: Table of Contents Some common misconceptions about BitTorrent Useful information about filesharing and what can precipitate a copyright violation Helpful Links Some common misconceptions about BitTorrent I used encryption, so my activities will be undetectable to outside sources.Encrypting BitTorrent files will not protect you from detection by copyright holders and their representatives. While encryption may […]
» Subjects: ,