Cybersecurity, data integrity, and compliance for institutional activities.

Categories (1)

Articles (12)

Pinned Article What to Do if Your Account is Compromised

A compromised account is one accessed by a person not authorized to use the account.

Authoring Secure and Trustworthy Emails

A well-intended message may not get read or taken seriously if recipients think an email is a phishing scam.

Malware Infections

Malware is an umbrella term for malicious software that is intentionally designed to cause damage to a device, disrupt service, or to gain unauthorized access to a device or to data.  Types of Malware include, but are not limited to,  computer viruses, worms, Trojan horses, ransomware, spyware, and adware.

Microsoft Office: Macros & Enabled Content

Macros are small bits of programming used to automate tasks that can also be used for spreading viruses and malware. Anti-virus programs cannot always catch all malicious macros. Opening an infected document can infect your machine, so it's important to take precautions.

Physical Security and Awareness

Good physical security is one of the best ways to prevent an IT security incident.

Ransomware Infections

Ransomware is a type of malware that prevents or limits users from accessing their system and/or data by encrypting it.

Securing Mobile Devices

Quick tips to secure your mobile device

Securing Physical Media and Using Physical Media File Storage and Sharing

Information about using physical media to store or share data.

Securing Your University-owned Computer

At North Central University, we strive to provide a safe and secure computing environment for the campus community and recommend that you follow safe computing practices.

Strengthen and Secure Your Passwords or Passphrases

Your university password or passphrase is the key that provides access to your North Central services, such as email, financial systems, and various websites. Learning how to strengthen your university password or passphrase will help keep your private information safer. This article shares tips and best practices to help you stay secure.

You can also apply these dos and don'ts to your other online services, such as non-NCU email, credit card and bank accounts, e-commerce, and social networki

What is an IT Security Incident?

What is an IT security incident? What type of impact can a security incident have on the university? How do I report an incident?

Wireless Networking Safety Tips

Wireless networks are convenient, but they are also inherently unsecure. Therefore, it is your responsibility as a user to exercise caution when connecting wirelessly.