Articles (36)

Pinned Article Policies on IT resources

This article explains requirements related to the use of institutional IT resources based on the University System of New Hampshire Written Information Security Program (“WISP”). The WISP consists of security policies and standards intended to protect USNH data and are in alignment with applicable laws and regulations.

Antivirus Software for macOS

This article contains information regarding Antivirus Software; CrowdStrike Falcon and Avira. Antivirus Software is a critical part of securing your computer, institutional data, and your personal information. On University and USNH grant funded Apple Mac systems CrowdStrike Falcon is the required Antivirus. Avira is strongly suggested for personally owned Apple Mac devices.

Antivirus Software for Windows

This article contains information regarding the Antivirus Software CrowdStrike Falcon for Windows devices. Antivirus Software is a critical part of securing your computer, institutional data, and your personal information.  On University and USNH grant funded Windows systems CrowdStrike Falcon is the required Antivirus. Microsoft Defender is strongly suggested for personally owned Windows devices.

Basic & Modern Authentication: Frequently Asked Questions (FAQ)

This article contains frequently asked questions about Basic and Modern Authentication. Microsoft is phasing out Basic Authentication support starting on October 1, 2022. ET&S has been assisting users to transition away from Basic Authentication for several months and provides these instructions to help student and staff continue to have access to email and other services after Microsoft makes this change. This article is for students, faculty, and staff at USNH.

COPPA (Children's Online Privacy Protection)

This article provides USNH community members an introduction to the Federal Privacy law entitled Children's Online Privacy Protection Act (COPPA). COPPA is a law that establishes a strict set of guidelines for online operations to protect the privacy of children under the age of 13.
Intended Audience: This article is intended for USNH administrators of websites or online services wherein a child under age 13 is providing personal information.

Cybersecurity Incident Reporting

This article explains how to report a cybersecurity incident for students, faculty, and staff. Reporting a cybersecurity incident is everyone's responsibility. Please be sure to report to your manager so that they can contact the Cyber Ops team via the relevant helpdesk at your campus or directly via It.security@unh.edu .

ESI: Electronically Stored Information

This article contains information for the USNH community of procedures involving electronically stored information: information stored, processed, and/or transmitted with USNH technology resources.
Intended Audience: This article is intended for information technology service providers, data stewards, and persons authorized to access certain restricted and sensitive information.

File-Sharing of Copyrighted Materials

This article contains information regarding illegal file-sharing for all USNH community members who access USNH information technology resources.  This article specifically covers laws related to distribution of copyrighted materials through peer-to-peer file sharing.

Good Security Practices to Adopt at Work/School, and at Home

This article provides information regarding good security practices to adopt at work, school, and at home.

Handle Data with Care

This article provides information on handling University data with care.

How Can I Tell if My Device is Joined to the USNH Enterprise Active Directory?

This article provides instructions on how to tell if your Windows device is joined to the USNH Enterprise Active Directory. There are two ways to determine if a computer is joined to the USNH Active Directory Domain; through the Control Panel on the device, or the Command Prompt app.

How to Confirm a Windows Device has All Available Patches Applied Windows 10

This article includes instructions on how to check if updates are needed on a Windows 10 computer, and how to apply them if necessary.

How to Find a Device Host Name or MAC Address

This article shows how to find the host name or MAC address of a device on both Windows 10 and Mac OS X.

How to Proceed after Your USNH Account was Compromised

This article provides steps to take if your USNH Account was compromised, after it has been secured and recovered. If you believe your USNH Account has been compromised, call the USNH Technology Help Desk immediately at https://www.usnh.edu/it/need-it-help for assistance in securing and recovering your account. This is an important step as it is not always enough for you to simply change your password.

Jamf Connect

Jamf Connect is tool that allows users' to log into their Macs using their USNH username and password without being bound to the USNH domain. This article introduces the user to the components of Jamf Connect.

Jamf Pro - Apple Device Management at USNH

This article explains Jamf Pro, an IT and asset management system used by USNH.

Mobile Device Health and Security

Mobile device health and security is explained in this article, including the purpose, why mobile security is needed, and some of the best practices to use.

Password Managers 101

This article explains what password managers are and what they do.

PCI DSS - Payment Card Security

Payment Card Industry Data Security Standard (PCI DSS) is explained in this article, including who must comply, the merchant responsibilities, and the employee responsibilities.

Phishing and Spam

Phishing is an attempt to acquire confidential information such as account passwords, identification numbers or credit card details by pretending to be a trusted entity in electronic communications including email, texting and instant messaging. This article is for students, faculty, and staff.

Red Flag Rule - Identity Theft Prevention

This article contains information regarding identity theft prevention and the Federal Trade Commission Red Flags Rule at USNH.

Signs Your Account is Compromised

Signs that your account is compromised and related information are included in this article. In today’s information security threat landscape, the creativity, ingenuity, and perseverance of the cybercrimimals who want to steal your credentials seem to have no limits. Unfortunately, with threats coming from so many directions, even the most careful users can end up with compromised credentials.

Storing Restricted, Protected, and Sensitive Information @ USNH

This article contains information regarding storing restricted, protected, and sensitive information at USNH using SharePoint and OneDrive.

Tenable Nessus Privacy Statement

This article contains information regarding Tenable Nessus, including an outline of data elements collected by Tenable Nessus agents, and serves as a privacy policy and justification for deployment. This article is for users and administrators of servers or endpoints that store, process, or transmit sensitive or restricted information.

The Use of E-mail with Personally Identifiable Information (PII)

This article provides information for USNH employees regarding the best practices of use of e-mail communication with personally identifiable information (PII).

Tips for Keeping Your Devices Secure

This article contains tips for keeping your devices secure.

Using Facebook, Google or other Social Login Services

This article contains information regarding securing your account on social login services.

USNH Campus Virus Protection

This article provides links to virus protection software for the USNH community, for both institutional and personal devices.

USNH Centrally-Managed Devices and Computer Quarantine FAQ

This is a list of frequently asked questions regarding the USNH Computer Quarantine effort to help keep the data of all USNH employees secure.

Vendor Contract Language Review

Vendor contract language is reviewed in this article.

Vendor Information Security and Privacy Considerations and Security Assessment Review (SAR)

This article contains information about vendor information security, privacy considerations, and security assessment review (SAR) for USNH community members engaged with vendors involved with USNH information technology resources. The purpose is to guide USNH community members regarding vendors and/or third-party partners that provide products or services that integrate with the USNH network.

What Does "Automated Management" of a Computer Actually Mean

This article contains information on automated management of a computer.

What Is the Risk Assessment Process?

This article contains information on IT risk assessments.

What's the Deal with Publicly Posted Credentials?

The following FAQ is intended to address the most common questions received from users whose accounts have been secured because their university credentials were posted publicly.