Search173 Results

A list of video resources to help users learn about phishing, ransomware and other IT security topics.
See these resources to ensure compliance with ECU's accessibility compliance program.
Written permission is often required when including students, patients and others in research, project or promotional videos.
If you manage web content on the domain, see this article on required compliance with federal and state laws and ECU policy.
Answers to questions on using, storing and disposing of social security numbers and the SSN/PII regulation.
Staff who use an ECU-managed computer are required to maintain a software inventory as well as proof of purchase for software licenses.
Cisco AMP for Endpoints is a cloud-based malware protection software installed on ECU-managed computers.
Vishing, or voice phishing, is a scam that occurs over the phone. Learn how to protect yourself.
To prevent data loss and compromise, it is important that every user report any security concerns, whether benign and accidental or malicious and deliberate.
Learn how to spot phishing, spear phishing and ransomware email and what to do if you become a victim.
ECU's passphrase security standard ensures accounts are protected from unauthorized use.
Short article of five best security practices for staff and faculty.
ECU supports several solutions for online meetings, including dedicated conference rooms and classrooms for groups or software that connects two or more individuals through a desktop, laptop or mobile device.
Connect and configure the ECU eduroam network for your Chromebook.