Search12 Results

North Central utilizes multi-factor Authentication (MFA) for all users, including faculty, staff, adjuncts, and students. Learn how to set up MFA using the Microsoft Authenticator.
This article provides instructions for how to use a one-time password code through the Microsoft Authenticator app when you have a weak or no signal to your cell phone or cannot receive notifications.
Although your first instinct may be to ignore or delete suspicious emails, we recommend that you report them to our security team. IT will examine the email and advise you of any further steps you may need to take.
Phishing attacks and other email scams take advantage of personal and professional relationships, organizational hierarchies, and human curiosities — information that is now readily available through social media and professional networking websites.
What is an IT security incident? What type of impact can a security incident have on the university? How do I report an incident?
Information about using physical media to store or share data.
At North Central University, we strive to provide a safe and secure computing environment for the campus community and recommend that you follow safe computing practices.
Quick tips to secure your mobile device
Good physical security is one of the best ways to prevent an IT security incident.
Spear phishing is a form of phishing that targets people. Request gift cards is a common tactic among spear phishers.
Ransomware is a type of malware that prevents or limits users from accessing their system and/or data by encrypting it.
Malware is an umbrella term for malicious software that is intentionally designed to cause damage to a device, disrupt service, or to gain unauthorized access to a device or to data.  Types of Malware include, but are not limited to,  computer viruses, worms, Trojan horses, ransomware, spyware, and adware.