Search7 Results
- Services
- Technology
- Cybersecurity
Request access to One Leavitt Lane or report issues with existing access.
- Services
- Technology
- Cybersecurity
Messages quarantined as High Confidence Phishing by Microsoft have met specific conditions; whether it’s suspicious message composition commonly seen in phishing messages, inclusion of suspicious or malicious links or attachments, or even poor sender reputation. Once quarantined as High Confidence Phishing, the message must be reviewed by USNH CyberOps to ensure it presents no real threat to USNH IT Systems and the community prior to its release.
- Services
- Technology
- Cybersecurity
The Cybersecurity Operations team is available to assist in responding to and investigating events and incidents that may have information security implications (e.g. Red Flag, Compromised Account, Unauthorized Access, etc.)
- Services
- Technology
- Cybersecurity
Technology Vendors who may be contracted to provide IT services to The University System of New Hampshire or USNH institutions must demonstrate compliance with applicable USNH policies and/or regulatory standards by completing a Security Assessment Review.
- Services
- Technology
- Cybersecurity
If you are experiencing problems with a security camera that is on the USNH network AND is currently in the Wisenet Wave video management system (VMS), click on the green “Request Service” button and submit the request form.
- Services
- Technology
- Cybersecurity
Video cameras that are installed at the University of New Hampshire for safety and law enforcement purposes and video data from such cameras must comply with the Public Safety Video Camera System (PSVCS) standard.
- Services
- Technology
- Cybersecurity
All use of USNH institutional information must be approved by the appropriate data steward including use of institutional data housed in one system or application that will be uploaded/sent/feed into another system or application. The Data Access Request process facilitates requesting, approving, and tracking requests for access to and use of data.