Generally, most technology tools and services are available globally. There are, however, some nations that block traffic to and from specific services, and the Unites States maintains sanctions against certain countries that prohibit network communications.
This document guides you through the process of using custom attributes to tag IP addresses and IP address block with identifying tags than can be used for specific processing by the Information Security Office (ISO)
This article outlines the steps to set up multi-factor authentication (MFA) or two-step (or two-factor) authentication (2FA), to the most common service providers.
Recommendations to secure an Android device.
This page provides tips to for protecting yourself against online scams related to COVID-19.
This article is a quick reference for how to handle, transmit and dispose of sensitive data.
This is a quick reference table that shows the data sensitivity levels allowed in UO Collaboration tools.
What is Doxxing, how do we avoid it, and respond if it should happen.
This is a FAQ article regarding email spoofing.
This article is an introduction of Europe's General Data Protection Regulation for individuals in the states interested in compliance laws and data rights. Additional links are available for students or staff curious about the University of Oregon's data classifications and standards.
This article provides an overview of GLBA and the resources available at the University of Oregon.
This article provides a high level overview of securing home networks with links to specific articles.
This article contains security recommendations for home Wi-Fi networks.
List of recommendations for users planning to travel abroad with computing resources.
Security recommendations for iOS devices including iPads, iPhones, and iPods.
This article provides guidance on securing personal IoT devices
Background: On October 16, 2017, security researchers disclosed a flaw in the WPA2 protocol used to secure wireless communications. Impact: Any product that communicates over Wi-Fi and uses WPA or WPA2 to encrypt that traffic is vulnerable. This includes nearly all mobile devices, computers, connected home devices, and wireless access points and routers. Communications between vulnerable devices could be decrypted and hijacked.
This procedure seeks to ensure that Learning Tool Integrations (LTIs) with the UO’s Academic Learning Management System (LMS) are appropriately assessed and documented to protect the confidentiality, integrity and availability of the data.
This article provides an overview of how to secure a personal mobile device.
Security best practices and guidelines for personally owned computers running the macOS operating system.
Security best practices and guidelines for personally owned computers running the Windows operating system.
Learn about the "Introduction to Phishing" online training module available to everyone at the UO.
Information of how to protect your information from hackers and identity thieves.
This article provides basic instruction on how to access the Proofpoint Security Awareness Training (PSAT) platform.
This article describes the Security Awareness Program at the University of Oregon
Info on SSL certificates.
This article covers UO standards on media sanitation.
Some tips for how to value your data — such as your location, contacts, and photos — as much as the people and companies who buy it.
The UO community is often the target of unwanted email messaging campaigns requesting that the user visit a website and enter their credentials in order to address an urgent issue with their accounts, banking records, student information, and employee records. This knowledge base article will provide you with ten (10) basic tips that everyone can follow to help discern whether an email message is face.
If you are traveling for work to one or more countries that are deemed to pose high information security risks, take a loaner laptop and smartphone to help keep intellectual property—yours and the university’s—safer
Learn about UO Cybersecurity Basics, an online training available to all UO employees, and about cybersecurity awareness.
Learn how to use the "Report Phish" button in Outlook to report phishing emails to the UO Information Security Office.
Self-testing for SSL vulnerabilities can be performed via several methods. Each of these methods gives visibility into slightly different facets of the SSL configuration and posture of the server.
This article contains information on preventing an account compromise as well as how to regain access once an account is compromised.