- Knowledge Base
- Information Technology
- Email, Accounts, & Access
This article outlines how the University of Montana Information Security Office responds to compromised devices, including containment, remediation, and restoration of access, following the Identify, Protect, Detect, Respond, and Recover incident response framework.
- Knowledge Base
- Information Technology
- Best Practices and Guidelines
Best practices to Telecommute safely and securely.
- Knowledge Base
- Information Technology
- Email, Accounts, & Access
This document contains information about and answers to frequently asked questions regarding multi-factor authentication provided by DUO Security.
- Knowledge Base
- Information Technology
- Email, Accounts, & Access
Have you received spam or phishing email? Not sure what spam and phishing email is? Take a look at this article for helpful information on spam and phishing email and how and what to report to IT to help reduce it.