Commerce in a Time of COVID-19
Working behind the scenes after the pandemic hit, the Finance and Operations IT team quickly adopted touchless technologies to keep students, staff and faculty safe.
Working behind the scenes after the pandemic hit, the Finance and Operations IT team quickly adopted touchless technologies to keep students, staff and faculty safe.
Beginning Sept. 27, Zoom will enforce the application of either the waiting room or a passcode to all Zoom meetings, including those already scheduled. You and those you support are encouraged to take two actions.
The frequency, creativity and severity of cyber-attacks we are seeing on our networks continues to increase. It is very important for Finance and Operations staff to understand the most common computer safety threats we encounter. UNC-Chapel Hill students and employees are now … Read more
Choosing a strong ONYEN password (now only once a year) and keeping it safe from prying eyes is the best way to protect all of the valuable resources available to you with a unc.edu account.
All staff, faculty and students at UNC-Chapel Hill now have access to OneDrive for business, so get rid of your USB thumb drives and start sharing files the safe and easy way.
When traveling with a UNC computer or a personal computer, remember these easy safety tips to keep your identity and personal information secure.
Conduct online banking and shopping confidently and safely at home by following these six easy home network security tips: For Windows Users, enable Windows Firewall and Windows Defender on your machine. For Mac users, enable the application firewall and install … Read more
Never approve an authentication request from Microsoft Authenticator or Duo if you have not been attempting to log into a UNC or Microsoft resource. Depending on which type of authentication request you chose, these requests may come as push notifications, … Read more
Do you really need that file from 2005? If not, delete it! North Carolina law and UNC’s Records Retention and Disposal Policy require that employees discard information that is no longer relevant to the operation of the University.
When you lose your phone, do you lose your contacts? When you replace your phone, do you lose your apps? When you upgrade your phone do your malicious apps come along to the new phone? There are many tools that … Read more