Search7 Results

This article outlines how the University of Montana Information Security Office responds to compromised devices, including containment, remediation, and restoration of access, following the Identify, Protect, Detect, Respond, and Recover incident response framework.
Best practices to Telecommute safely and securely.
This document contains information about and answers to frequently asked questions regarding multi-factor authentication provided by DUO Security.
Have you received spam or phishing email? Not sure what spam and phishing email is? Take a look at this article for helpful information on spam and phishing email and how and what to report to IT to help reduce it.