Support Articles

February 27, 2018 - 10:21 am
When traveling in China, you may find that access to Google's GMail service is blocked at the country's "Great Firewall."  This can often be circumvented by use of a third-party VPN service that you've purchased prior to your trip. However, please keep in mind that electronic eavesdropping is considered to be widely prevalent in China, and the computers of foreign travelers are often compromised in an attempt to gain access to research and corporate data.  In short, if you can live without your e-mail for the duration of your stay, that's the safest thing to do.  If you can't, consider taking...
February 27, 2018 - 10:04 am
Phishing attacks use a combination of emails or instant messages and malicious websites to solicit personal information (i.e., they are "fishing" for information).  A phishing attack will typically attempt to emulate the look of a genuine website and email.  Often, the phishing attack will try to convince the reader that they must act immediately or face some dire consequence.  Recently, phishing scams have become more common on social networking sites.  If you receive a phishing scam in your UNI email, please forward the email to phishing@uni.edu and security@uni.edu. Remember these tips...
February 27, 2018 - 9:37 am
The University of Northern Iowa is committed to protecting the data entrusted to its care.  An easy and relatively transparent way to aid in achieving this goal is the encryption of hard drives used on university-owned computers.  Whole Disk Encryption (WDE) works by converting the data stored on the drive in such a way that it is undecipherable without the decryption key, thereby protecting the data from theft if the computer is stolen or operated by an unauthorized person.  When an authorized user starts the computer and logs in, their passphrase permits the computer to decrypt the contents...

Pages

  • ITTC 36
  • (319) 273-5555
  • Service Hub