Information Security Articles RSS Feed
Microsoft Security Essentials and Windows Defender Installation
Viewed 57456 times since Wed, Aug 12, 2015
Installing Windows Defender on Windows 8 and Windows 10 Windows Defender comes pre-installed on Windows 8 and Windows 10 computers. University of New Hampshire faculty and staff should use System Center Endpoint Protection for Institutionally... Read More
UNH Campus Virus Protection
Viewed 26490 times since Wed, Aug 12, 2015
UNH Campus Virus Protection The University of New Hampshire practices defensive computing and is dedicated to providing the information and services needed to make your computing environment secure. Antivirus Software for Windows Antivirus... Read More
System Center 2012 Endpoint Protection Windows Installation
Viewed 21192 times since Wed, Aug 12, 2015
Microsoft System Center Endpoint Protection (SCEP) is an antivirus/malware tool developed and distributed by Microsoft for business level security, and is available to all UNH Institutionally Owned computers. Personally Owned computers are¬... Read More
Antivirus Software for Windows
Viewed 14117 times since Wed, Aug 12, 2015
 Institutionally Owned Windows Computers System Center 2012 Endpoint Protection is Microsoft's antivirus solution for enterprise computers. It is licensed for installation and use on Institutionally Owned computers, computers owned by the... Read More
Antivirus Software for Mac
Viewed 9867 times since Wed, Aug 12, 2015
Institutionally Owned Apple Computers  ESET Endpoint Antivirus is licensed for installation and use on Institutionally Owned computers, computers owned by the University of New Hampshire and/or the University System of New Hampshire offices. ... Read More
Microsoft Security Essentials and Windows Defender Usage
Viewed 8233 times since Wed, Aug 12, 2015
Updating, Scanning, and Virus Removal Updating Because new viruses and malware are released daily, Microsoft regularly releases new virus definitions for Microsoft Security Essentials (MSE) and Windows Defender (Defender). MSE and Defender will... Read More
Phishing and Spam
Viewed 7547 times since Wed, Apr 29, 2015
Phishing is a serious, persistent and evolving threat Phishing is an attempt to acquire confidential information such as account passwords, identification numbers or credit card details by pretending to be a trusted entity in electronic... Read More
FAQs- System Center 2012 Endpoint Protection, Microsoft Security Essentials, and Windows Defender
Viewed 6538 times since Wed, Aug 12, 2015
FAQs- System Center 2012 Endpoint Protection and Microsoft Security Essentials What Windows antivirus products are available to faculty/staff and UNH students? Faculty/Staff: The University of New Hampshire has secured Microsoft System Center 2012... Read More
Encryption & Virus Protection
Viewed 4474 times since Wed, Apr 29, 2015
Encryption Data encryption helps protect information by making it unreadable to unauthorized persons and processes and is an important protection if you or your department deals with UNH sensitive or legally protected data, and particularly if you... Read More
Policies on IT resources
Viewed 4042 times since Wed, Mar 25, 2015
Policies from both the University System of New Hampshire (USNH) and the University of New Hampshire (UNH) guide the use of IT resources at UNH.   Please review these policies regularly as updates can occur at any time.  If you have questions... Read More
SEED: Accepted Equipment List & Disposal Guide
Viewed 3829 times since Tue, Apr 28, 2015
Decision Guide Not sure if your electronic equipment can be placed in a dumpster or if it should go through SEED? What do you do if you need help with equipment that may contain hazardous materials? Use the Decision Guide to determine if you should... Read More
SEED: Safe Electronic Equipment Disposal Instructions
Viewed 3427 times since Mon, Apr 27, 2015
Use the  Safe Electronic Equipment Disposal Form  to enter disposal requests.  You will receive an email from the SEED program manager when your request is approved    NOTE: Your request must be entered no later than two weeks prior to... Read More
Vendor Contracts: Information Security and Privacy Considerations and Security Assessment Review
Viewed 3093 times since Mon, May 4, 2015
Information Security and Privacy Considerations for  UNH IT Vendor Contracts Contracts for information technology services establish important expectations and requirements and must include assurances on the appropriate levels of information... Read More
PCI DSS - Payment Card Security
Viewed 2941 times since Thu, May 7, 2015
The information provided on this page is an overview only.¬†¬† For detailed guidance based on your department’s payment business process,¬† please email the UNH PCI DSS Steering Committee at unh.pcisc@unh.edu.¬† The UNH PCI DSS Steering... Read More
Red Flag Rule - Identity Theft Prevention
Viewed 2698 times since Thu, May 7, 2015
Federal Trade Commission (FTC) Red Flags Rule (RFR) at UNH What Is RFR?  From the FTC website: The Red Flags Rule requires many businesses and organizations to implement a written Identity Theft Prevention Program designed to detect the warning... Read More
ESI: Electronically Stored Information Procedures
Viewed 2328 times since Wed, Apr 29, 2015
Electronically Stored Information (ESI) Incident Response Procedures Do you understand the proper procedures for disclosing student or UNH information? Information technology service providers, data stewards and persons who are authorized to... Read More
How to Spot a ‚ÄúPhishing‚ÄĚ Email
Viewed 2294 times since Tue, Feb 2, 2016
Adapted from http://www.csoonline.com/article/2130760/data-protection/118916-How-to-spot-a-phishing-email.html While there is no technique that can spot phishing emails with 100% certainty, these are some logical steps that you can use to determine... Read More
COPPA: Children’s Online Privacy Protection
Viewed 2247 times since Wed, Apr 29, 2015
The University of New Hampshire complies with the requirements of the Children's Online Privacy Protection Act (COPPA).  This Federal law defines users' rights and information management requirements applicable to the online collection... Read More
Storing Restricted and Sensitive Data in Box @ UNH
Viewed 2032 times since Thu, May 28, 2015
Box @ UNH provides enhanced security via SSL connection and encryption of data at rest; however, some data is inappropriate for storage in Box @ UNH as well as most university general use servers and fileshares. UNH Data Classifications and Storage... Read More
Network Registration & Vulnerability Scans
Viewed 1843 times since Wed, Apr 29, 2015
To register your Personal Computer, Server or Printer on the UNH Network, go to  Network Registration.   See UNH Network Operations  for more information on secure networks, scanning and other services. Registering your computer on... Read More
Tips to Avoid Malware
Viewed 1811 times since Thu, May 7, 2015
Certain websites and programs should be avoided on both your home and work computers. Given the prevalence of malware, cryptographic hijackers, advertising and marketing software and other malicious programs, this list can serve as a general guide as... Read More
Should you send or receive UNH personally identifiable information by email?
Viewed 1809 times since Thu, Jun 9, 2016
The transmission of personally identifiable information (PII) by email or fax should only be done when no other practical options are available and the communication serves a legitimate business need.  Emailing or faxing PII classified as restricted... Read More
Mobile Device Health and Security
Viewed 1652 times since Fri, Jul 10, 2015
Purpose of mobile security: Safeguarding your identity and personal information is your primary responsibility. You must have a security-aware mindset This article provides general recommendations for mobile security to enhance personal and... Read More
Tax Related Identity Theft
Viewed 1333 times since Wed, Feb 17, 2016
For 2016 the Internal Revenue Service is again reporting increased incidences of tax related identity theft a trend which began in 2011.  For more on the national scope of tax related identity theft read - IRS Still Plagued by Identity Theft This... Read More
Using Facebook, Google or other Social Login Services
Viewed 1290 times since Fri, Aug 26, 2016
By  now, almost all of us have done this - When trying to access a new service, you are given the option to create another account in the new service/website or login using your Facebook, Google or other social account.  Why create another account... Read More
Password Managers 101
Viewed 1254 times since Mon, Oct 16, 2017
What They Are… Password Managers are exactly what they sound like. They are applications that everyday users can utilize to manage passwords and usernames for their many website and application accounts. These tools make it easier to follow good... Read More
File-Sharing Policy
Viewed 1251 times since Tue, Jun 2, 2015
The Higher Education Opportunity Act (HEOA) includes provisions to reduce the illegal uploading and downloading of copyrighted materials through peer-to-peer (P2P) file sharing. HEOA requires that: Institutions make an annual disclosure that informs... Read More
Tips for Keeping Your Devices Secure
Viewed 1206 times since Fri, Aug 4, 2017
We all live in a connected world where the smartphone in our pocket or the laptop in our bag often contain all the information required to steal an identity, utilize financial resources, and infiltrate secure spaces.   The prevalence of cybercrime... Read More
What’s the Deal with Publicly Posted Credentials?
Viewed 1196 times since Thu, Jun 29, 2017
UNH Information Security Services (ISS) regularly receives alerts from a variety of sources notifying the University that UNH credentials, which can include any combination of UNH email, UNH username, and/or password, have been posted publicly... Read More
Good Security Practices to Adopt at Work/School, and at Home
Viewed 1180 times since Fri, Jul 14, 2017
Separate Work/School and Home. Avoid using your UNH email address as your username for any personal accounts and never use your UNH username as the username for a personal account.  Keeping a clear separation between your UNH username, password, and... Read More
Signs Your Account is Compromised
Viewed 1124 times since Wed, Aug 16, 2017
In today’s information security threat landscape, the creativity, ingenuity, and perseverance of the cybercrimimals who want to steal your credentials seem to have no limits.¬† If it isn’t credential-seeking malware dropped on your device... Read More
Recommended tools for SFTP/FTP
Viewed 921 times since Mon, Sep 10, 2018
If you must transfer files between computers on the UNH network, Information Security Services (ISS) recommends that you use SFTP ‚Äď a secure connection method. FTP should only be used if there are no other options available. ISS recommends the use... Read More
Things to Consider if Your UNH Account has been Compromised
Viewed 841 times since Wed, Aug 16, 2017
If you believe your UNH Account has been compromised, call the UNH IT Service Desk at 603-862-4242 immediately for assistance in securing and recovering your account.  This is an important step as it is not always enough to simply change your... Read More
Why Can’t I Forward Emails to Phishing.Report@unh.edu?
Viewed 692 times since Thu, Feb 22, 2018
ISS recently changed some internal settings that internally altered the way e-mails were sent to phishing.report@unh.edu. The email address is still active and we encourage users to continue to submit their reports. If you are having issues sending... Read More
Install ESET Mac Antivirus Software
Viewed 685 times since Wed, Mar 6, 2019
 ESET Endpoint Antivirus is available for Institutionally Owned Apple computers. Connect to UNH secure wireless network: UNH-Secure, or secure wired network, or the UNH VPN if you are off campus. Access UNH fileshare:  smb://filestore.unh.edu... Read More
UNH Information Security Services - Tax Season Resources
Viewed 670 times since Wed, Feb 21, 2018
Tax season is prime time for cyber crime.  During this time of year, cyber criminals perpetrate scams to obtain the personally identifiable information needed to steal an identity, file tax returns against stolen identities, and engage in other... Read More
Using ESET Mac Antivirus Software
Viewed 468 times since Thu, Mar 7, 2019
Updating Open ESET Endpoint Antivirus by clicking the icon on the menu bar In the ESET Endpoint Antivirus interface, click the  Update  tab, located on the left column. Click  Update modules , to begin update.  All modules are up to... Read More
AirDrop - iOS and Mac Peer-to-peer Sharing - Information and Security Details
Viewed 359 times since Tue, Mar 26, 2019
General Information Apple has a feature built into Mac, iPhone, iPad, and iPod Touch called AirDrop.  AirDrop allows for easy, wireless sharing of images, documents, calendar items, contact details, and more from one device to another without... Read More
How to Check Your Google Chrome Version
Viewed 304 times since Fri, Apr 26, 2019
1. On your computer, open Chrome. At the top right, click the three vertical dots symbol called ‚ÄúCustomize and Control Google Chrome‚ÄĚ. If your Chrome needs an update, the dropdown menu that opens will contain an option ‚ÄúUpdate Google Chrome‚ÄĚ.... Read More
Handle Data with Care
Viewed 189 times since Tue, May 7, 2019
You are the first and best line of defense in protecting University data.   Unintentional, accidental, or malicious release of personally identifiable information or other protected information can expose the University to regulatory or legal... Read More
Find sensitive data before the bad guys do
Viewed 187 times since Tue, May 7, 2019
Spirion (formerly known as UNH Identity Finder or IDF) is an application offered by Information Security Services (ISS) to UNH faculty and UNH/USNH staff.  Spirion scans your computer, file-shares and emails for unsecured sensitive information such... Read More