Support Articles

February 27, 2018 - 10:48 am
UNI Security Request System This document is intended to introduce you to the Security Request System (SRS) and explain why it was built, how it works, how to get help in using it and the initial steps for going live.  If you have questions on the system, please contact the IT Service Desk (x3-5555 or servicedesk@uni.edu) and they will either answer your question or get you in touch with someone that can. Why do we need a system to manage security requests? The Security Request System (SRS) was identified as a need here at UNI after the implementation of the e-Business system.  Paper forms...
February 27, 2018 - 10:39 am
Despite your best efforts, something bad can happen to your computer.  Hardware or software failures in addition to security threats can make your data disappear.  The best protection against such events is an adequate backup strategy. Manual Backups The practice of manually backing up your data consists of manually copying your data from one location to another, or to another device.  This could be copying files to a flash drive, external hard drive, or even copying the files to another computer.  This process, though time consuming, is usually the first step in backing up your data. ...
February 27, 2018 - 10:21 am
When traveling in China, you may find that access to Google's GMail service is blocked at the country's "Great Firewall."  This can often be circumvented by use of a third-party VPN service that you've purchased prior to your trip. However, please keep in mind that electronic eavesdropping is considered to be widely prevalent in China, and the computers of foreign travelers are often compromised in an attempt to gain access to research and corporate data.  In short, if you can live without your e-mail for the duration of your stay, that's the safest thing to do.  If you can't, consider taking...
February 27, 2018 - 10:04 am
Phishing attacks use a combination of emails or instant messages and malicious websites to solicit personal information (i.e., they are "fishing" for information).  A phishing attack will typically attempt to emulate the look of a genuine website and email.  Often, the phishing attack will try to convince the reader that they must act immediately or face some dire consequence.  Recently, phishing scams have become more common on social networking sites.  If you receive a phishing scam in your UNI email, please forward the email to phishing@uni.edu and security@uni.edu. Remember these tips...
February 27, 2018 - 9:37 am
The University of Northern Iowa is committed to protecting the data entrusted to its care.  An easy and relatively transparent way to aid in achieving this goal is the encryption of hard drives used on university-owned computers.  Whole Disk Encryption (WDE) works by converting the data stored on the drive in such a way that it is undecipherable without the decryption key, thereby protecting the data from theft if the computer is stolen or operated by an unauthorized person.  When an authorized user starts the computer and logs in, their passphrase permits the computer to decrypt the contents...

Pages

  • ITTC 36
  • (319) 273-5555
  • Service Hub