Security Articles RSS Feed
UNH Campus Virus Protection
Viewed 10257 times since Wed, Aug 12, 2015
UNH Campus Virus Protection The University of New Hampshire practices defensive computing and is dedicated to providing the information and services needed to make your computing environment secure. Antivirus Software for Windows Antivirus... Read More
Microsoft Security Essentials and Windows Defender Installation
Viewed 5498 times since Wed, Aug 12, 2015
Installing Windows Defender on Windows 8 and Windows 10 Windows Defender comes pre-installed on Windows 8 and Windows 10 computers. University of New Hampshire faculty and staff should use System Center Endpoint Protection for Institutionally... Read More
System Center 2012 Endpoint Protection Windows Installation
Viewed 4748 times since Wed, Aug 12, 2015
Microsoft System Center Endpoint Protection (SCEP) is an antivirus/malware tool developed and distributed by Microsoft for business level security, and is available to all UNH Institutionally Owned computers. Personally Owned computers are¬... Read More
Antivirus Software for Windows
Viewed 4421 times since Wed, Aug 12, 2015
 Institutionally Owned Windows Computers System Center 2012 Endpoint Protection is Microsoft's antivirus solution for enterprise computers. It is licensed for installation and use on Institutionally Owned computers, computers owned by... Read More
Antivirus Software for Mac
Viewed 3827 times since Wed, Aug 12, 2015
Institutionally Owned Apple Computers System Center 2012 Endpoint Protection is Microsoft's antivirus solution for enterprise computers. It is licensed for installation and use on Institutionally Owned computers, computers owned by the... Read More
Microsoft Security Essentials and Windows Defender Usage
Viewed 3685 times since Wed, Aug 12, 2015
Updating, Scanning, and Virus Removal Updating Because new viruses and malware are released daily, Microsoft regularly releases new virus definitions for Microsoft Security Essentials (MSE) and Windows Defender (Defender). MSE and Defender will... Read More
System Center 2012 Endpoint Protection for Mac Installation
Viewed 2512 times since Wed, Aug 12, 2015
System Center 2012 Endpoint Protection for Mac is available for Institutionally Owned  Apple computers. Connect to UNH secure wireless network: unh-highspeed, or secure wired network or the UNH VPN if you are off campus.   Access UNH fileshare:... Read More
FAQs- System Center 2012 Endpoint Protection, Microsoft Security Essentials, and Windows Defender
Viewed 2354 times since Wed, Aug 12, 2015
FAQs- System Center 2012 Endpoint Protection and Microsoft Security Essentials What Windows antivirus products are available to faculty/staff and UNH students? Faculty/Staff: The University of New Hampshire has secured Microsoft System Center... Read More
Phishing and Spam
Viewed 1619 times since Wed, Apr 29, 2015
Phishing is a serious, persistent and evolving threat Phishing is an attempt to acquire confidential information such as account passwords, identification numbers or credit card details by pretending to be a trusted entity in electronic... Read More
System Center 2012 Endpoint Protection Windows Usage Instructions
Viewed 1484 times since Wed, Aug 12, 2015
Updating Open System Center by double clicking the System Center icon in your notification area.   Click the Update Tab. Click Update.     Scanning Open System Center by double clicking the System Center icon in your notification... Read More
SEED: Accepted Equipment List & Disposal Guide
Viewed 1468 times since Tue, Apr 28, 2015
Decision Guide Not sure if your electronic equipment can be placed in a dumpster or if it should go through SEED? What do you do if you need help with equipment that may contain hazardous materials? Use the Decision Guide to determine if you should... Read More
Vendor Contracts: Privacy Considerations, Security Review, and NDA
Viewed 1434 times since Mon, May 4, 2015
Privacy Considerations for  UNH IT Vendor Contracts Contracts for information technology services establish important expectations and requirements and must include assurances on the appropriate levels of protection of information and privacy. The... Read More
System Center 2012 Endpoint Protection for Mac Usage Instructions
Viewed 1416 times since Wed, Aug 12, 2015
Updating, Scanning, and Virus Removal Updating Open System Center 2012 Endpoint Protection by double clicking the icon on the menu bar.   In the System Center 2012 Endpoint Protection interface, click the Update tab, located on... Read More
SEED: Safe Electronic Equipment Disposal Instructions
Viewed 1365 times since Mon, Apr 27, 2015
Use the  Safe Electronic Equipment Disposal Form  to enter disposal requests.  You will receive an email from the SEED program manager when your request is approved    NOTE: Your request must be entered no later than two weeks prior to... Read More
Policies on IT resources
Viewed 1267 times since Wed, Mar 25, 2015
Policies from both the University System of New Hampshire (USNH) and the University of New Hampshire (UNH) guide the use of IT resources at UNH.   Please review these policies regularly as updates can occur at any time.  If you have questions... Read More
Encryption & Virus Protection
Viewed 1088 times since Wed, Apr 29, 2015
Encryption Data encryption helps protect information by making it unreadable to unauthorized persons and processes and is an important protection if you or your department deals with UNH sensitive or legally protected data, and particularly if you... Read More
Red Flag Rule - Identity Theft Prevention
Viewed 1017 times since Thu, May 7, 2015
Federal Trade Commission (FTC) Red Flags Rule (RFR) at UNH What Is RFR?  From the FTC website: The Red Flags Rule requires many businesses and organizations to implement a written Identity Theft Prevention Program designed to detect the... Read More
ESI: Electronically Stored Information Procedures
Viewed 957 times since Wed, Apr 29, 2015
Electronically Stored Information (ESI) Incident Response Procedures Do you understand the proper procedures for disclosing student or UNH information? Information technology service providers, data stewards and persons who are authorized to... Read More
UNH Server Best Practices
Viewed 810 times since Fri, Jun 12, 2015
In keeping with existing UNH and USNH policies, it is the duty of server administrators to maintain servers in a secure fashion. Maintaining each part of the network environment is a crucial step toward the goal of keeping that environment healthy... Read More
PCI DSS - Payment Card Security
Viewed 800 times since Thu, May 7, 2015
The information provided on this page is an overview only.¬†¬† For detailed guidance based on your department’s payment business process,¬† please email the UNH PCI DSS Steering Committee at¬† The UNH PCI DSS Steering... Read More
Storing Restricted and Sensitive Data in Box @ UNH
Viewed 701 times since Thu, May 28, 2015
Box @ UNH provides enhanced security via SSL connection and encryption of data at rest; however, some data is inappropriate for storage in Box @ UNH as well as most university general use servers and fileshares. UNH Data Classifications and Storage... Read More
Network Registration & Vulnerability Scans
Viewed 686 times since Wed, Apr 29, 2015
To register your Personal Computer, Server or Printer on the UNH Network, go to  Network Registration.   See UNH Network Operations  for more information on secure networks, scanning and other services. Registering your computer on... Read More
How to Spot a ‚ÄúPhishing‚ÄĚ Email
Viewed 685 times since Tue, Feb 2, 2016
Adapted from While there is no technique that can spot phishing emails with 100% certainty, these are some logical steps that you can use to determine... Read More
COPPA: Children’s Online Privacy Protection
Viewed 681 times since Wed, Apr 29, 2015
The University of New Hampshire complies with the requirements of the Children's Online Privacy Protection Act (COPPA).  This Federal law defines users' rights and information management requirements applicable to the online collection... Read More
Mobile Device Health and Security
Viewed 592 times since Fri, Jul 10, 2015
Mobile Device Health & Security Anthony Dumas, USNH Information Security Services (ISS), July, 2015 Purpose of mobile security: Safeguarding your identity and personal information is your primary responsibility. Safeguarding your access to UNH... Read More
Ransomware arrives on the Mac: OSX/KeRanger-A
Viewed 555 times since Thu, Mar 10, 2016
It’s happened: there’s now ransomware for the Mac, and it’s been named OSX/KeRanger-A  Here’s what the crooks and their malware do: Trick you into updating an application you are inclined to trust. When you do so,... Read More
Tips to Avoid Malware
Viewed 525 times since Thu, May 7, 2015
 Tony Dumas, April 2014 Certain websites and programs should be avoided when online. Given the prevalence of malware, advertising and marketing software and other malicious programs, this list can serve as a guide to what types of websites and... Read More
The Fake Speeding Ticket Scam - What Will Hackers Think of Next?
Viewed 524 times since Mon, Apr 4, 2016
What is it? A new malware phishing threat has emerged that uses smartphone GPS and fake speeding tickets to install malware on computer systems. Residents in Pennsylvania have received emails appearing to come from a local police department claiming... Read More
Find sensitive data before the bad folks do!
Viewed 490 times since Mon, Jun 27, 2016
UNH Identity Finder (IDF) is a free application offered by Information Security Services (ISS) to UNH faculty and UNH/USNH staff.  IDF scans your computer, file-shares and emails for unsecured sensitive information, such as Social Security Numbers,... Read More
Back-up your files today!
Viewed 468 times since Mon, Nov 16, 2015
Back-up your files today! UNH ISS, November, 2015 Ransomware is one of the fastest growing types of cybercrime and you can best protect yourself by ensuring your computer is backed-up regularly. Ransomware scams, such as ‘CryptoWall’,... Read More
Tax Related Identity Theft
Viewed 446 times since Wed, Feb 17, 2016
For 2016 the Internal Revenue Service is again reporting increased incidences of tax related identity theft a trend which began in 2011.  For more on the national scope of tax related identity theft read - IRS Still Plagued by Identity Theft This... Read More
Using Facebook, Google or other Social Login Services
Viewed 429 times since Fri, Aug 26, 2016
By  now, almost all of us have done this - When trying to access a new service, you are given the option to create another account in the new service/website or login using your Facebook, Google or other social account.  Why create another account... Read More
Should you send or receive UNH personally identifiable information by email?
Viewed 427 times since Thu, Jun 9, 2016
The transmission of personally identifiable information (PII) by email or fax should only be done when no other practical options are available and the communication serves a legitimate business need.  Emailing or faxing PII classified as restricted... Read More
File-Sharing Policy
Viewed 420 times since Tue, Jun 2, 2015
The Higher Education Opportunity Act (HEOA) includes provisions to reduce the illegal uploading and downloading of copyrighted materials through peer-to-peer (P2P) file sharing. HEOA requires that: Institutions make an annual disclosure that informs... Read More
How to Determine if Your Computer is Vulnerable to WannaCry or Petya Ransomware
Viewed 220 times since Tue, Jun 27, 2017
The following instructions can be used to determine if a computer is vulnerable to the known Wannacry and Petya ransomware strains and to remediate the vulnerability. ¬†For Windows 7 PC’s: Click ‘Start’ in the lower-left corner of... Read More
What’s the Deal with Publicly Posted Credentials?
Viewed 94 times since Thu, Jun 29, 2017
UNH Information Security Services (ISS) regularly receives alerts from a variety of sources notifying the University that UNH credentials, which can include any combination of UNH email, UNH username, and/or password, have been posted publicly... Read More
Good Security Practices to Adopt at Work/School, and at Home
Viewed 87 times since Fri, Jul 14, 2017
Separate Work/School and Home. Avoid using your UNH email address as your username for any personal accounts and never use your UNH username as the username for a personal account.  Keeping a clear separation between your UNH username, password, and... Read More
Tips for Keeping Your Devices Secure
Viewed 46 times since Fri, Aug 4, 2017
We all live in a connected world where the smartphone in our pocket or the laptop in our bag often contain all the information required to steal an identity, utilize financial resources, and infiltrate secure spaces.   The prevalence of cybercrime... Read More
Signs Your Account is Compromised
Viewed 37 times since Wed, Aug 16, 2017
In today’s information security threat landscape, the creativity, ingenuity, and perseverance of the cybercrimimals who want to steal your credentials seems to have no limits.¬† If it isn’t credential-seeking malware dropped on your... Read More
How to Subscribe to the Information Security Services Blog
Viewed 36 times since Fri, Aug 11, 2017
To subscribe to the UNH ISS blog feed click on this link: A yellow square should appear in the top left corner of your browser window.  Click the "Subscribe Now" button. In the "Subscribe with Live Bookmark"... Read More
Things to Consider if Your UNH Account has been Compromised
Viewed 35 times since Wed, Aug 16, 2017
If you believe your UNH Account has been compromised, call the UNH IT Service Desk at 603-862-4242 immediately for assistance in securing and recovering your account.  This is an important step as it is not always enough to simply change your... Read More