Learn how to keep data safe, including personal and institutional data, with these videos. This channel covers two-step login, digital certificates, and more.
…Read more
Less…
-
Links in this video:Protect IU website: protect.iu.edu Disaster Recovery Planning resources: go.iu.edu/dr-plan Business Continuity Planning help and resources:…
Disaster Recovery and Business Continuity Planning
-
Learn how to install your digital certificate on an Android device so you can digitally sign your emails. Two separate methods are covered in this video, demonstrated…
Installing a Digital Certificate on an Android…
-
At IU, it's a good idea to make sure your emails are signed with your digital certificate. In this video, you'll learn how to install and set up a digital…
Installing a Digital Certificate on an iOS Device
-
Learn how to install your digital certificate with Outlook 2016 on MacOS so you can digitally sign your emails with this video.
Installing a Digital Certificate using MacOS
-
Learn how to install your digital certificate with Outlook 2016 on Windows so you can digitally sign your emails with this video.
Installing a Digital Certificate using Windows
-
Links in this video:IU Policy IT-12: go.iu.edu/it-12 Security configs for smart phones and tablets: kb.iu.edu/d/bcnh#phone Stolen device help: kb.iu.edu/d/avbx Clear…
Mobile Security Standard
-
Links in this video:IU Policy IT-12: go.iu.edu/it-12 Unified Device Management (UDM) at IU: kb.iu.edu/d/bfhn UDM Service Overview: kb.iu.edu/d/beae Protect IU best…
Patch Management Resources
-
Links in this video:Policy DM-01: go.iu.edu/dm-01 Connecting to VPN: kb.iu.edu/d/aygt IP addresses at IUB & IUPUI: kb.iu.edu/d/ayft IP addresses at regional…
Public IP Addresses
-
Learn how to ensure that protected health data is handled safely with this video. Please note: this video uses automatically generated captions. From time-to-time,…
Securing HIPAA Workflows on UITS Systems
-
Links in this video:IU Policy IT-12: go.iu.edu/it-12 Log-ALERT with Splunk configurations: kb.iu.edu/d/bflj IU Log-ALERT site: logalert.iu.edu Protect IU best practices…
System Log Review
-
Links in this video: IU Policy IT-12: go.iu.edu/it-12 Protect IU website: protect.iu.edu Use a Less Privileged Account: go.iu.edu/accounts-priv The Principle of Least…
Use of Administrative Accounts
-
Links in this video:Vulnerability scanners: go.iu.edu/web-scan Protect IU site: protect.iu.edu Security First site: securityfirst.iu.edu In this video, you'll…
Vulnerability Scans
-
Curious about what two-step login is, and how it keeps your personal information safe? Follow the adventures of Tracey Two-Step and learn more about two-step login at…
Why Two-Step Login?
Search for ""