Security Articles RSS Feed
UNH Campus Virus Protection
Viewed 19922 times since Wed, Aug 12, 2015
UNH Campus Virus Protection The University of New Hampshire practices defensive computing and is dedicated to providing the information and services needed to make your computing environment secure. Antivirus Software for Windows Antivirus... Read More
Microsoft Security Essentials and Windows Defender Installation
Viewed 19642 times since Wed, Aug 12, 2015
Installing Windows Defender on Windows 8 and Windows 10 Windows Defender comes pre-installed on Windows 8 and Windows 10 computers. University of New Hampshire faculty and staff should use System Center Endpoint Protection for Institutionally... Read More
System Center 2012 Endpoint Protection Windows Installation
Viewed 11661 times since Wed, Aug 12, 2015
Microsoft System Center Endpoint Protection (SCEP) is an antivirus/malware tool developed and distributed by Microsoft for business level security, and is available to all UNH Institutionally Owned computers. Personally Owned computers are¬... Read More
Antivirus Software for Windows
Viewed 9398 times since Wed, Aug 12, 2015
 Institutionally Owned Windows Computers System Center 2012 Endpoint Protection is Microsoft's antivirus solution for enterprise computers. It is licensed for installation and use on Institutionally Owned computers, computers owned by the... Read More
Antivirus Software for Mac
Viewed 6910 times since Wed, Aug 12, 2015
Institutionally Owned Apple Computers System Center 2012 Endpoint Protection‚ÄĮis Microsoft's antivirus solution for enterprise computers. It is licensed for installation and use on Institutionally Owned computers, computers owned by the... Read More
Microsoft Security Essentials and Windows Defender Usage
Viewed 6100 times since Wed, Aug 12, 2015
Updating, Scanning, and Virus Removal Updating Because new viruses and malware are released daily, Microsoft regularly releases new virus definitions for Microsoft Security Essentials (MSE) and Windows Defender (Defender). MSE and Defender will... Read More
Phishing and Spam
Viewed 4647 times since Wed, Apr 29, 2015
Phishing is a serious, persistent and evolving threat Phishing is an attempt to acquire confidential information such as account passwords, identification numbers or credit card details by pretending to be a trusted entity in electronic... Read More
System Center 2012 Endpoint Protection for Mac Installation
Viewed 4365 times since Wed, Aug 12, 2015
System Center 2012 Endpoint Protection for Mac is available for Institutionally Owned  Apple computers. Connect to UNH secure wireless network: unh-highspeed, or secure wired network or the UNH VPN if you are off campus.   Access UNH fileshare:... Read More
FAQs- System Center 2012 Endpoint Protection, Microsoft Security Essentials, and Windows Defender
Viewed 4018 times since Wed, Aug 12, 2015
FAQs- System Center 2012 Endpoint Protection and Microsoft Security Essentials What Windows antivirus products are available to faculty/staff and UNH students? Faculty/Staff: The University of New Hampshire has secured Microsoft System Center 2012... Read More
System Center 2012 Endpoint Protection Windows Usage Instructions
Viewed 3222 times since Wed, Aug 12, 2015
Updating Open System Center by double clicking the System Center icon in your notification area.   Click the Update Tab. Click Update.     Scanning Open System Center by double clicking the System Center icon in your notification area.  ... Read More
SEED: Accepted Equipment List & Disposal Guide
Viewed 2786 times since Tue, Apr 28, 2015
Decision Guide Not sure if your electronic equipment can be placed in a dumpster or if it should go through SEED? What do you do if you need help with equipment that may contain hazardous materials? Use the Decision Guide to determine if you should... Read More
Encryption & Virus Protection
Viewed 2761 times since Wed, Apr 29, 2015
Encryption Data encryption helps protect information by making it unreadable to unauthorized persons and processes and is an important protection if you or your department deals with UNH sensitive or legally protected data, and particularly if you... Read More
System Center 2012 Endpoint Protection for Mac Usage Instructions
Viewed 2748 times since Wed, Aug 12, 2015
Updating, Scanning, and Virus Removal Updating Open System Center 2012 Endpoint Protection by double clicking the icon on the menu bar.   In the System Center 2012 Endpoint Protection interface, click the Update tab, located on the left... Read More
Policies on IT resources
Viewed 2707 times since Wed, Mar 25, 2015
Policies from both the University System of New Hampshire (USNH) and the University of New Hampshire (UNH) guide the use of IT resources at UNH.   Please review these policies regularly as updates can occur at any time.  If you have questions... Read More
SEED: Safe Electronic Equipment Disposal Instructions
Viewed 2404 times since Mon, Apr 27, 2015
Use the  Safe Electronic Equipment Disposal Form  to enter disposal requests.  You will receive an email from the SEED program manager when your request is approved    NOTE: Your request must be entered no later than two weeks prior to... Read More
Vendor Contracts: Privacy Considerations, Security Review, and NDA
Viewed 2095 times since Mon, May 4, 2015
Privacy Considerations for  UNH IT Vendor Contracts Contracts for information technology services establish important expectations and requirements and must include assurances on the appropriate levels of protection of information and privacy. The... Read More
ESI: Electronically Stored Information Procedures
Viewed 1804 times since Wed, Apr 29, 2015
Electronically Stored Information (ESI) Incident Response Procedures Do you understand the proper procedures for disclosing student or UNH information? Information technology service providers, data stewards and persons who are authorized to... Read More
PCI DSS - Payment Card Security
Viewed 1751 times since Thu, May 7, 2015
The information provided on this page is an overview only.¬†¬† For detailed guidance based on your department’s payment business process,¬† please email the UNH PCI DSS Steering Committee at unh.pcisc@unh.edu.¬† The UNH PCI DSS Steering... Read More
Red Flag Rule - Identity Theft Prevention
Viewed 1746 times since Thu, May 7, 2015
Federal Trade Commission (FTC) Red Flags Rule (RFR) at UNH What Is RFR?  From the FTC website: The Red Flags Rule requires many businesses and organizations to implement a written Identity Theft Prevention Program designed to detect the warning... Read More
How to Spot a ‚ÄúPhishing‚ÄĚ Email
Viewed 1509 times since Tue, Feb 2, 2016
Adapted from http://www.csoonline.com/article/2130760/data-protection/118916-How-to-spot-a-phishing-email.html While there is no technique that can spot phishing emails with 100% certainty, these are some logical steps that you can use to determine... Read More
UNH Server Best Practices
Viewed 1414 times since Fri, Jun 12, 2015
In keeping with existing UNH and USNH policies, it is the duty of server administrators to maintain servers in a secure fashion. Maintaining each part of the network environment is a crucial step toward the goal of keeping that environment healthy... Read More
Storing Restricted and Sensitive Data in Box @ UNH
Viewed 1383 times since Thu, May 28, 2015
Box @ UNH provides enhanced security via SSL connection and encryption of data at rest; however, some data is inappropriate for storage in Box @ UNH as well as most university general use servers and fileshares. UNH Data Classifications and Storage... Read More
COPPA: Children’s Online Privacy Protection
Viewed 1354 times since Wed, Apr 29, 2015
The University of New Hampshire complies with the requirements of the Children's Online Privacy Protection Act (COPPA).  This Federal law defines users' rights and information management requirements applicable to the online collection... Read More
Network Registration & Vulnerability Scans
Viewed 1212 times since Wed, Apr 29, 2015
To register your Personal Computer, Server or Printer on the UNH Network, go to  Network Registration.   See UNH Network Operations  for more information on secure networks, scanning and other services. Registering your computer on... Read More
Mobile Device Health and Security
Viewed 1193 times since Fri, Jul 10, 2015
Mobile Device Health & Security Anthony Dumas, USNH Information Security Services (ISS), July, 2015 Purpose of mobile security: Safeguarding your identity and personal information is your primary responsibility. Safeguarding your access to UNH... Read More
Should you send or receive UNH personally identifiable information by email?
Viewed 1103 times since Thu, Jun 9, 2016
The transmission of personally identifiable information (PII) by email or fax should only be done when no other practical options are available and the communication serves a legitimate business need.  Emailing or faxing PII classified as restricted... Read More
Tips to Avoid Malware
Viewed 1074 times since Thu, May 7, 2015
 Tony Dumas, April 2014 Certain websites and programs should be avoided when online. Given the prevalence of malware, advertising and marketing software and other malicious programs, this list can serve as a guide to what types of websites and... Read More
Back-up your files today!
Viewed 967 times since Mon, Nov 16, 2015
Back-up your files today! UNH ISS, November, 2015 Ransomware is one of the fastest growing types of cybercrime and you can best protect yourself by ensuring your computer is backed-up regularly. Ransomware scams, such as ‘CryptoWall’,... Read More
Find sensitive data before the bad folks do!
Viewed 967 times since Mon, Jun 27, 2016
UNH Identity Finder (IDF) is a free application offered by Information Security Services (ISS) to UNH faculty and UNH/USNH staff.  IDF scans your computer, file-shares and emails for unsecured sensitive information, such as Social Security Numbers,... Read More
Using Facebook, Google or other Social Login Services
Viewed 922 times since Fri, Aug 26, 2016
By  now, almost all of us have done this - When trying to access a new service, you are given the option to create another account in the new service/website or login using your Facebook, Google or other social account.  Why create another account... Read More
Tax Related Identity Theft
Viewed 870 times since Wed, Feb 17, 2016
For 2016 the Internal Revenue Service is again reporting increased incidences of tax related identity theft a trend which began in 2011.  For more on the national scope of tax related identity theft read - IRS Still Plagued by Identity Theft This... Read More
File-Sharing Policy
Viewed 828 times since Tue, Jun 2, 2015
The Higher Education Opportunity Act (HEOA) includes provisions to reduce the illegal uploading and downloading of copyrighted materials through peer-to-peer (P2P) file sharing. HEOA requires that: Institutions make an annual disclosure that informs... Read More
What’s the Deal with Publicly Posted Credentials?
Viewed 663 times since Thu, Jun 29, 2017
UNH Information Security Services (ISS) regularly receives alerts from a variety of sources notifying the University that UNH credentials, which can include any combination of UNH email, UNH username, and/or password, have been posted publicly... Read More
Good Security Practices to Adopt at Work/School, and at Home
Viewed 620 times since Fri, Jul 14, 2017
Separate Work/School and Home. Avoid using your UNH email address as your username for any personal accounts and never use your UNH username as the username for a personal account.  Keeping a clear separation between your UNH username, password, and... Read More
Password Managers 101
Viewed 613 times since Mon, Oct 16, 2017
What They Are… Password Managers are exactly what they sound like. They are applications that everyday users can utilize to manage passwords and usernames for their many website and application accounts. These tools make it easier to follow good... Read More
Signs Your Account is Compromised
Viewed 567 times since Wed, Aug 16, 2017
In today’s information security threat landscape, the creativity, ingenuity, and perseverance of the cybercrimimals who want to steal your credentials seem to have no limits.¬† If it isn’t credential-seeking malware dropped on your device... Read More
Tips for Keeping Your Devices Secure
Viewed 547 times since Fri, Aug 4, 2017
We all live in a connected world where the smartphone in our pocket or the laptop in our bag often contain all the information required to steal an identity, utilize financial resources, and infiltrate secure spaces.   The prevalence of cybercrime... Read More
How to Determine if Your Windows Device is Automatically Updating
Viewed 467 times since Thu, Nov 2, 2017
The following instructions can be used to determine if a Windows computer is¬†being automatically updated. ¬†For Windows 7 PC’s: Click ‘Start’ in the lower-left corner of your screen ¬† 2.¬†Type¬†Windows Update¬†¬†in the ¬†text... Read More
Things to Consider if Your UNH Account has been Compromised
Viewed 443 times since Wed, Aug 16, 2017
If you believe your UNH Account has been compromised, call the UNH IT Service Desk at 603-862-4242 immediately for assistance in securing and recovering your account.  This is an important step as it is not always enough to simply change your... Read More
UNH Information Security Services - Tax Season Resources
Viewed 262 times since Wed, Feb 21, 2018
Tax season is prime time for cyber crime.  During this time of year, cyber criminals perpetrate scams to obtain the personally identifiable information needed to steal an identity, file tax returns against stolen identities, and engage in other... Read More
Why Can’t I Forward Emails to Phishing.Report@unh.edu?
Viewed 250 times since Thu, Feb 22, 2018
ISS recently changed some internal settings that internally altered the way e-mails were sent to phishing.report@unh.edu. The email address is still active and we encourage users to continue to submit their reports. If you are having issues sending... Read More
Recommended tools for SFTP/FTP
Viewed 60 times since Mon, Sep 10, 2018
If you must transfer files between computers on the UNH network, Information Security Services (ISS) recommends that you use SFTP ‚Äď a secure connection method. FTP should only be used if there are no other options available. ISS recommends the use... Read More