This article explains requirements related to the use of institutional IT resources based on the University System of New Hampshire Written Information Security Program (“WISP”). The WISP consists of security policies and standards intended to protect USNH data and are in alignment with applicable laws and regulations.
This article contains information regarding Antivirus Software; CrowdStrike Falcon and Avira. Antivirus Software is a critical part of securing your computer, institutional data, and your personal information. On University and USNH grant funded Apple Mac systems CrowdStrike Falcon is the required Antivirus. Avira is strongly suggested for personally owned Apple Mac devices.
This article contains information regarding the Antivirus Software CrowdStrike Falcon for Windows devices. Antivirus Software is a critical part of securing your computer, institutional data, and your personal information. On University and USNH grant funded Windows systems CrowdStrike Falcon is the required Antivirus. Microsoft Defender is strongly suggested for personally owned Windows devices.
This article contains frequently asked questions about Basic and Modern Authentication. Microsoft is phasing out Basic Authentication support starting on October 1, 2022. ET&S has been assisting users to transition away from Basic Authentication for several months and provides these instructions to help student and staff continue to have access to email and other services after Microsoft makes this change. This article is for students, faculty, and staff at USNH.
This article provides USNH community members an introduction to the Federal Privacy law entitled Children's Online Privacy Protection Act (COPPA). COPPA is a law that establishes a strict set of guidelines for online operations to protect the privacy of children under the age of 13.
Intended Audience: This article is intended for USNH administrators of websites or online services wherein a child under age 13 is providing personal information.
This article explains how to report a cybersecurity incident for students, faculty, and staff. Reporting a cybersecurity incident is everyone's responsibility. Please be sure to report to your manager so that they can contact the Cyber Ops team via the relevant helpdesk at your campus or directly via It.security@unh.edu .
This article contains information for the USNH community of procedures involving electronically stored information: information stored, processed, and/or transmitted with USNH technology resources.
Intended Audience: This article is intended for information technology service providers, data stewards, and persons authorized to access certain restricted and sensitive information.
This article contains information regarding illegal file-sharing for all USNH community members who access USNH information technology resources. This article specifically covers laws related to distribution of copyrighted materials through peer-to-peer file sharing.
This article provides information regarding good security practices to adopt at work, school, and at home.
This article provides information on handling University data with care.
This article provides instructions on how to tell if your Windows device is joined to the USNH Enterprise Active Directory. There are two ways to determine if a computer is joined to the USNH Active Directory Domain; through the Control Panel on the device, or the Command Prompt app.
This article includes instructions on how to check if updates are needed on a Windows 10 computer, and how to apply them if necessary.
This article shows how to find the host name or MAC address of a device on both Windows 10 and Mac OS X.
This article provides steps to take if your USNH Account was compromised, after it has been secured and recovered. If you believe your USNH Account has been compromised, call the USNH Technology Help Desk immediately at
https://www.usnh.edu/it/need-it-help for assistance in securing and recovering your account. This is an important step as it is not always enough for you to simply change your password.
Jamf Connect is tool that allows users' to log into their Macs using their USNH username and password without being bound to the USNH domain. This article introduces the user to the components of Jamf Connect.
This article explains Jamf Pro, an IT and asset management system used by USNH.
Mobile device health and security is explained in this article, including the purpose, why mobile security is needed, and some of the best practices to use.
This article explains what password managers are and what they do.
Payment Card Industry Data Security Standard (PCI DSS) is explained in this article, including who must comply, the merchant responsibilities, and the employee responsibilities.
Phishing is an attempt to acquire confidential information such as account passwords, identification numbers or credit card details by pretending to be a trusted entity in electronic communications including email, texting and instant messaging. This article is for students, faculty, and staff.
This article contains information regarding identity theft prevention and the Federal Trade Commission Red Flags Rule at USNH.
Signs that your account is compromised and related information are included in this article. In today’s information security threat landscape, the creativity, ingenuity, and perseverance of the cybercrimimals who want to steal your credentials seem to have no limits. Unfortunately, with threats coming from so many directions, even the most careful users can end up with compromised credentials.
This article contains information regarding storing restricted, protected, and sensitive information at USNH using SharePoint and OneDrive.
This article contains information regarding Tenable Nessus, including an outline of data elements collected by Tenable Nessus agents, and serves as a privacy policy and justification for deployment. This article is for users and administrators of servers or endpoints that store, process, or transmit sensitive or restricted information.
This article provides information for USNH employees regarding the best practices of use of e-mail communication with personally identifiable information (PII).
This article contains tips for keeping your devices secure.
This article contains information regarding securing your account on social login services.
This article provides links to virus protection software for the USNH community, for both institutional and personal devices.
This is a list of frequently asked questions regarding the USNH Computer Quarantine effort to help keep the data of all USNH employees secure.
Vendor contract language is reviewed in this article.
This article contains information about vendor information security, privacy considerations, and security assessment review (SAR) for USNH community members engaged with vendors involved with USNH information technology resources. The purpose is to guide USNH community members regarding vendors and/or third-party partners that provide products or services that integrate with the USNH network.
This article contains information on automated management of a computer.
This article contains information on IT risk assessments.
The following FAQ is intended to address the most common questions received from users whose accounts have been secured because their university credentials were posted publicly.