Search12 Results
- Knowledge Base
- Accounts & Access
North Central utilizes multi-factor Authentication (MFA) for all users, including faculty, staff, adjuncts, and students. Learn how to set up MFA using the Microsoft Authenticator.
- Knowledge Base
- Accounts & Access
This article provides instructions for how to use a one-time password code through the Microsoft Authenticator app when you have a weak or no signal to your cell phone or cannot receive notifications.
- Knowledge Base
- Cybersecurity
- Phishing, Spam, & Compromised Accounts
Although your first instinct may be to ignore or delete suspicious emails, we recommend that you report them to our security team. IT will examine the email and advise you of any further steps you may need to take.
- Knowledge Base
- Cybersecurity
- Phishing, Spam, & Compromised Accounts
Phishing attacks and other email scams take advantage of personal and professional relationships, organizational hierarchies, and human curiosities — information that is now readily available through social media and professional networking websites.
- Knowledge Base
- Cybersecurity
What is an IT security incident? What type of impact can a security incident have on the university? How do I report an incident?
- Knowledge Base
- Cybersecurity
Information about using physical media to store or share data.
- Knowledge Base
- Cybersecurity
At North Central University, we strive to provide a safe and secure computing environment for the campus community and recommend that you follow safe computing practices.
- Knowledge Base
- Cybersecurity
Quick tips to secure your mobile device
- Knowledge Base
- Cybersecurity
Good physical security is one of the best ways to prevent an IT security incident.
- Knowledge Base
- Cybersecurity
- Phishing, Spam, & Compromised Accounts
Spear phishing is a form of phishing that targets people. Request gift cards is a common tactic among spear phishers.
- Knowledge Base
- Cybersecurity
Ransomware is a type of malware that prevents or limits users from accessing their system and/or data by encrypting it.
- Knowledge Base
- Cybersecurity
Malware is an umbrella term for malicious software that is intentionally designed to cause damage to a device, disrupt service, or to gain unauthorized access to a device or to data. Types of Malware include, but are not limited to, computer viruses, worms, Trojan horses, ransomware, spyware, and adware.