Security Articles RSS Feed
UNH Campus Virus Protection
Viewed 7287 times since Wed, Aug 12, 2015
UNH Campus Virus Protection The University of New Hampshire practices defensive computing and is dedicated to providing the information and services needed to make your computing environment secure. Antivirus Software for Windows Antivirus... Read More
Microsoft Security Essentials and Windows Defender Installation
Viewed 3471 times since Wed, Aug 12, 2015
Installing Windows Defender on Windows 8 and Windows 10 Windows Defender comes pre-installed on Windows 8 and Windows 10 computers. University of New Hampshire faculty and staff should use System Center Endpoint Protection for Institutionally... Read More
System Center 2012 Endpoint Protection Windows Installation
Viewed 3126 times since Wed, Aug 12, 2015
Microsoft System Center Endpoint Protection (SCEP) is an antivirus/malware tool developed and distributed by Microsoft for business level security, and is available to all UNH Institutionally Owned computers. Personally Owned computers are¬... Read More
Antivirus Software for Windows
Viewed 3070 times since Wed, Aug 12, 2015
 Institutionally Owned Windows Computers System Center 2012 Endpoint Protection is Microsoft's antivirus solution for enterprise computers. It is licensed for installation and use on Institutionally Owned computers, computers owned by... Read More
Antivirus Software for Mac
Viewed 2587 times since Wed, Aug 12, 2015
Institutionally Owned Apple Computers System Center 2012 Endpoint Protection is Microsoft's antivirus solution for enterprise computers. It is licensed for installation and use on Institutionally Owned computers, computers owned by the... Read More
System Center 2012 Endpoint Protection for Mac Installation
Viewed 1788 times since Wed, Aug 12, 2015
System Center 2012 Endpoint Protection for Mac is available for Institutionally Owned  Apple computers. Connect to UNH secure wireless network: unh-highspeed, or secure wired network or the UNH VPN if you are off campus.   Access UNH fileshare:... Read More
FAQs- System Center 2012 Endpoint Protection, Microsoft Security Essentials, and Windows Defender
Viewed 1777 times since Wed, Aug 12, 2015
FAQs- System Center 2012 Endpoint Protection and Microsoft Security Essentials What Windows antivirus products are available to faculty/staff and UNH students? Faculty/Staff: The University of New Hampshire has secured Microsoft System Center... Read More
Microsoft Security Essentials and Windows Defender Usage
Viewed 1712 times since Wed, Aug 12, 2015
Updating, Scanning, and Virus Removal Updating Because new viruses and malware are released daily, Microsoft regularly releases new virus definitions for Microsoft Security Essentials (MSE) and Windows Defender (Defender). MSE and Defender will... Read More
Vendor Contracts: Privacy Considerations, Security Review, and NDA
Viewed 1300 times since Mon, May 4, 2015
Privacy Considerations for  UNH IT Vendor Contracts Contracts for information technology services establish important expectations and requirements and must include assurances on the appropriate levels of protection of information and privacy. The... Read More
System Center 2012 Endpoint Protection Windows Usage Instructions
Viewed 1094 times since Wed, Aug 12, 2015
Updating Open System Center by double clicking the System Center icon in your notification area.   Click the Update Tab. Click Update.     Scanning Open System Center by double clicking the System Center icon in your notification... Read More
SEED: Accepted Equipment List & Disposal Guide
Viewed 1090 times since Tue, Apr 28, 2015
Decision Guide Not sure if your electronic equipment can be placed in a dumpster or if it should go through SEED? What do you do if you need help with equipment that may contain hazardous materials? Use the Decision Guide to determine if you should... Read More
System Center 2012 Endpoint Protection for Mac Usage Instructions
Viewed 1083 times since Wed, Aug 12, 2015
Updating, Scanning, and Virus Removal Updating Open System Center 2012 Endpoint Protection by double clicking the icon on the menu bar.   In the System Center 2012 Endpoint Protection interface, click the Update tab, located on... Read More
Phishing and Spam
Viewed 1017 times since Wed, Apr 29, 2015
Phishing is a serious, persistent and evolving threat Phishing is an attempt to acquire confidential information such as account passwords, identification numbers or credit card details by pretending to be a trusted entity in electronic... Read More
SEED: Safe Electronic Equipment Disposal Instructions
Viewed 970 times since Mon, Apr 27, 2015
Use the  Safe Electronic Equipment Disposal Form  to enter disposal requests.  You will receive an email from the SEED program manager when your request is approved    NOTE: Your request must be entered no later than two weeks prior to... Read More
Policies on IT resources
Viewed 851 times since Wed, Mar 25, 2015
Policies from both the University System of New Hampshire (USNH) and the University of New Hampshire (UNH) guide the use of IT resources at UNH.   Please review these policies regularly as updates can occur at any time.  If you have questions... Read More
Encryption & Virus Protection
Viewed 776 times since Wed, Apr 29, 2015
Encryption Data encryption helps protect information by making it unreadable to unauthorized persons and processes and is an important protection if you or your department deals with UNH sensitive or legally protected data, and particularly if you... Read More
Red Flag Rule - Identity Theft Prevention
Viewed 633 times since Thu, May 7, 2015
Federal Trade Commission (FTC) Red Flags Rule (RFR) at UNH What Is RFR?  From the FTC website: The Red Flags Rule requires many businesses and organizations to implement a written Identity Theft Prevention Program designed to detect the... Read More
PCI DSS - Payment Card Security
Viewed 537 times since Thu, May 7, 2015
The information provided on this page is an overview only.¬†¬† For detailed guidance based on your department’s payment business process,¬† please email the UNH PCI DSS Steering Committee at unh.pcisc@unh.edu.¬† The UNH PCI DSS Steering... Read More
ESI: Electronically Stored Information Procedures
Viewed 510 times since Wed, Apr 29, 2015
Electronically Stored Information (ESI) Incident Response Procedures Do you understand the proper procedures for disclosing student or UNH information? Information technology service providers, data stewards and persons who are authorized to... Read More
Network Registration & Vulnerability Scans
Viewed 492 times since Wed, Apr 29, 2015
To register your Personal Computer, Server or Printer on the UNH Network, go to  Network Registration.   See UNH Network Operations  for more information on secure networks, scanning and other services. Registering your computer on... Read More
Storing Restricted and Sensitive Data in Box @ UNH
Viewed 491 times since Thu, May 28, 2015
Box @ UNH provides enhanced security via SSL connection and encryption of data at rest; however, some data is inappropriate for storage in Box @ UNH as well as most university general use servers and fileshares. UNH Data Classifications and Storage... Read More
How to Spot a ‚ÄúPhishing‚ÄĚ Email
Viewed 483 times since Tue, Feb 2, 2016
Adapted from http://www.csoonline.com/article/2130760/data-protection/118916-How-to-spot-a-phishing-email.html While there is no technique that can spot phishing emails with 100% certainty, these are some logical steps that you can use to determine... Read More
COPPA: Children’s Online Privacy Protection
Viewed 460 times since Wed, Apr 29, 2015
The University of New Hampshire complies with the requirements of the Children's Online Privacy Protection Act (COPPA).  This Federal law defines users' rights and information management requirements applicable to the online collection... Read More
Mobile Device Health and Security
Viewed 401 times since Fri, Jul 10, 2015
Mobile Device Health & Security Anthony Dumas, USNH Information Security Services (ISS), July, 2015 Purpose of mobile security: Safeguarding your identity and personal information is your primary responsibility. Safeguarding your access to UNH... Read More
Ransomware arrives on the Mac: OSX/KeRanger-A
Viewed 390 times since Thu, Mar 10, 2016
It’s happened: there’s now ransomware for the Mac, and it’s been named OSX/KeRanger-A  Here’s what the crooks and their malware do: Trick you into updating an application you are inclined to trust. When you do so,... Read More
Tips to Avoid Malware
Viewed 369 times since Thu, May 7, 2015
 Tony Dumas, April 2014 Certain websites and programs should be avoided when online. Given the prevalence of malware, advertising and marketing software and other malicious programs, this list can serve as a guide to what types of websites and... Read More
The Fake Speeding Ticket Scam - What Will Hackers Think of Next?
Viewed 361 times since Mon, Apr 4, 2016
What is it? A new malware phishing threat has emerged that uses smartphone GPS and fake speeding tickets to install malware on computer systems. Residents in Pennsylvania have received emails appearing to come from a local police department claiming... Read More
Back-up your files today!
Viewed 333 times since Mon, Nov 16, 2015
Back-up your files today! UNH ISS, November, 2015 Ransomware is one of the fastest growing types of cybercrime and you can best protect yourself by ensuring your computer is backed-up regularly. Ransomware scams, such as ‘CryptoWall’,... Read More
Find sensitive data before the bad folks do!
Viewed 306 times since Mon, Jun 27, 2016
UNH Identity Finder (IDF) is a free application offered by Information Security Services (ISS) to UNH faculty and UNH/USNH staff.  IDF scans your computer, file-shares and emails for unsecured sensitive information, such as Social Security Numbers,... Read More
Using Facebook, Google or other Social Login Services
Viewed 289 times since Fri, Aug 26, 2016
By  now, almost all of us have done this - When trying to access a new service, you are given the option to create another account in the new service/website or login using your Facebook, Google or other social account.  Why create another account... Read More
Tax Related Identity Theft
Viewed 284 times since Wed, Feb 17, 2016
For 2016 the Internal Revenue Service is again reporting increased incidences of tax related identity theft a trend which began in 2011.  For more on the national scope of tax related identity theft read - IRS Still Plagued by Identity Theft This... Read More
File-Sharing Policy
Viewed 283 times since Tue, Jun 2, 2015
The Higher Education Opportunity Act (HEOA) includes provisions to reduce the illegal uploading and downloading of copyrighted materials through peer-to-peer (P2P) file sharing. HEOA requires that: Institutions make an annual disclosure that informs... Read More
Should you send or receive UNH personally identifiable information by email?
Viewed 266 times since Thu, Jun 9, 2016
The transmission of personally identifiable information (PII) by email or fax should only be done when no other practical options are available and the communication serves a legitimate business need.  Emailing or faxing PII classified as restricted... Read More