Cybersecurity, data integrity, and compliance for institutional activities.
Learn what actions you should take to protect your accounts and report the incident.
A compromised account is one accessed by a person not authorized to use the account.
A well-intended message may not get read or taken seriously if recipients think an email is a phishing scam.
Malware is an umbrella term for malicious software that is intentionally designed to cause damage to a device, disrupt service, or to gain unauthorized access to a device or to data. Types of Malware include, but are not limited to, computer viruses, worms, Trojan horses, ransomware, spyware, and adware.
Macros are small bits of programming used to automate tasks that can also be used for spreading viruses and malware. Anti-virus programs cannot always catch all malicious macros. Opening an infected document can infect your machine, so it's important to take precautions.
Good physical security is one of the best ways to prevent an IT security incident.
Ransomware is a type of malware that prevents or limits users from accessing their system and/or data by encrypting it.
Quick tips to secure your mobile device
Information about using physical media to store or share data.
At North Central University, we strive to provide a safe and secure computing environment for the campus community and recommend that you follow safe computing practices.
Your university password or passphrase is the key that provides access to your North Central services, such as email, financial systems, and various websites. Learning how to strengthen your university password or passphrase will help keep your private information safer. This article shares tips and best practices to help you stay secure.
You can also apply these dos and don'ts to your other online services, such as non-NCU email, credit card and bank accounts, e-commerce, and social networki
What is an IT security incident? What type of impact can a security incident have on the university? How do I report an incident?
Wireless networks are convenient, but they are also inherently unsecure. Therefore, it is your responsibility as a user to exercise caution when connecting wirelessly.