Search Google Appliance

Information Technology

Security Support Articles

Filtered Results:

  • Note: Under a new university-wide contract, Sophos Intercept X Advanced with EDR and Sophos Home are replacing McAfee Endpoint Security at UMass Amherst. More information will follow. For questions, contact the IT professional in your department as applicable, or IT User Services. These...
  • Note: Under a new university-wide contract, Sophos Intercept X Advanced with EDR is replacing McAfee Endpoint Security at UMass Amherst. For questions, contact the IT professional in your department as applicable, or IT User Services. Windows These instructions are only for self-managed,...
  • Note: Under a new university-wide contract, Sophos Intercept X Advanced with EDR is replacing McAfee Endpoint Security at UMass Amherst. For questions, contact the IT professional in your department as applicable, or IT User Services. Windows These instructions are only for self-managed,...
  • This is draft documentation for the new Information Security Policy. We are actively developing this content and are soliciting feedback on it. Institutional Information and Research Data Categorization Examples Information is valued using considerations such as who can see it (confidentiality),...
  • This is draft documentation for the new Information Security Policy. We are actively developing this content and are soliciting feedback on it. Information and Information System Data Categorization Processes The general process for categorizing information and research data, categorizing...
  • This is draft documentation for the new Information Security Policy. We are actively developing this content and are soliciting feedback on it. The university owns all IT accounts, including NetID.  These accounts are created and provisioned to users for the purposes of accessing university IT...
  • We are actively developing this content and are soliciting feedback on it. What is IT Architecture? IT Architecture is a recognized area of focus aligned with the campus IT strategic plan. High-level long-term goals include: Materializing and sustaining a campus Information Technology...
  • DO: Treat your laptop and smart phone like cash. Leaving your laptop or mobile device unattended in plain sight is as tempting for thieves as leaving a wad of bills in the open. Always keep your electronics in a secure spot to deter theft.  Register your device with the University...
  • These pages provide step-by-step instructions for setting up passwords that restrict access to your computer and your documents. Guidelines for creating effective passwords are also included. To learn more about data security, see our Information Security Tips. Password Guidelines Consider...
  • Note: Under a new university-wide contract, Sophos Intercept X Advanced is replacing McAfee endpoint protection at UMass Amherst. More information will follow. For questions, contact the IT professional in your department as applicable, or IT User Services. Use Malware Removal Software Malware...
  • There are several steps you can take to protect against phishing: If you receive a suspicious email Do not reply, even if you recognize the sender as a well-known business or financial institution. If you have an account with this institution, contact them directly and ask them to verify the...
  • The following are instructions designed to guide you through removing the Enterprise edition of McAfee Endpoint Security from self-managed, university-owned machines running Mac OS only.  Note: If your computer is managed by UMass Amherst IT, do not attempt to remove the client on your own. Please...
  •   To report phishing messages, submit them as an attachment to the address: itprotect@umass.edu.  View an example of a phishing email.  To help us effectively respond to reports of phishing, you must forward the message as an attachment.   To forward an email as an attachment from Microsoft...
  • Computers compromised by malware are the most common data security incident on campus. Departments can choose to handle portions of an incident internally (using the checklist below) or contact UMass Amherst IT at security@umass.edu as soon as possible. If your department’s computers are...
  • Any data security incident involving a University-owned devices or personal devices containing sensitive University data should be taken seriously. Responding to data security incidents promptly and efficiently helps protect the University's assets (e.g., data, computers, networks) and ensures...
  • Any data security incident involving a University-owned or personal device containing sensitive University data is serious. Responding to data security incidents promptly and efficiently helps protect the University's assets (e.g., data, computers, networks) and ensures compliance with state and...
  • The Microsoft Rights Management Service (RMS) allows you to restrict access to Microsoft Office documents to specific individuals. RMS is integrated into Microsoft Office and is available for faculty and staff. Check with the IT professional in your department for assistance in enabling RMS for...
  • Your computer has been disconnected from the campus network and placed in the IT Safety Net. This is a holding area designed to protect the network from computers that are infected, compromised, or violate University policies. You can only access University email, SPIRE, and the IT Web site until...
  • Note: Under a new university-wide contract, Sophos Intercept X Advanced is replacing McAfee endpoint protection at UMass Amherst. More information will follow. For questions, contact the IT professional in your department as applicable, or IT User Services. Stay on track with the latest security...
  • Note: Under a new university-wide contract, Sophos Intercept X Advanced is replacing McAfee endpoint protection at UMass Amherst. More information will follow. For questions, contact the IT professional in your department as applicable, or IT User Services. Faculty and staff can protect their...

Pages