Spaces
Apps
Templates
Create
Answers
All content
Space settings
Content
Results will update as you type.
Accessibility of all Campus Materials
FREDLearn
Information Technology Services
Academic and Collaborative Technology
Enterprise Data Services
Enterprise Information Services
Enterprise Infrastructure Services
Enterprise Reporting and Development
Google Workspace
ITS Service Catalog
Networking
•
Project Management
•
Quick Start Digital Tools for Faculty/Staff
Quick Start Digital Tools for Students
ResNet
Security
•
Using temporary verification codes for MFA authentication
•
Password Protecting and Encrypting Adobe PDF files
•
Security Best Practices and Risks For Working Remotely
•
Security Best Practices for Video-teleconferencing
•
Set up the Microsoft Authenticator app
•
SUNY NIST Policy Initiative Frequently Asked Questions (FAQs)
•
KnowBe4 Training Platform
•
Multi-factor authentication (MFA) - FAQs
Security How-to articles
•
Passphrases
•
Recognize and Avoid Student Job Scams
SUNY Fredonia Data Storage Services
•
What is AppLocker and how are exceptions made?
•
Virtru Email Protection Guide
•
How to Password Protect and Encrypt Word files in Microsoft Office 365
•
How to request a "Kiosk" computer?
•
Information Security International Travel Guidelines
•
Zoom Settings for Health Data
•
How to Password Protect and Encrypt Files using 7-Zip for Windows
•
How to Password Protect and Encrypt Excel files in Microsoft Office 365
•
Computer Administrative Privileges FAQ and Request Process
•
Digital Millennium Copyright Act
•
eServices Password Security Standard
•
Firewall Rule Request Procedure
•
Fredonia Mail Data Loss Prevention Policy for Credit Card Numbers (CCN) and Social Security Numbers (SSN)
•
Fredonia Secure the Human Reference Guide
•
Getting started with 1Password Teams
•
How do I use admin access on my Windows 10 computer?
•
How to access the Fredonia Security Camera System Web Client
•
How to encrypt your Android or iOS Mobile Device?
•
How to Install and Use Spirion Endpoint Scanning for Restricted Information
•
How to know if your email has been compromised
Information Security Tips and Best Practices
•
State University of New York at Fredonia System/Network Login Banners
•
Step-by-Step MFA Setup Instructions
•
SUNY Fredonia Information Security Policy Inventory
•
1Password Two-Factor Authentication
•
Adding Multiple Sign-in Methods to Microsoft MFA
•
Campus Access Control Services
•
Data Risk Classification Policy
Data Security Program
•
Don't Ask Again for 14 Days Option - Microsoft MFA
•
Emeritus eServices FAQ
•
Fredonia Payment Card Industry - Data Security Standards
•
Infrastructure Security Office (ISO) Change Management Process
•
Know Your Fredonia ID - FAQ
•
Using YubiKeys with Azure MFA OATH-TOTP
•
VPN Instructions
•
Zoom Security Settings
Service Center
•
File lists
Marketing and Communications
•
Labels List
Answers
/
/
Security
/
Security How-to articles
Summarize
Security How-to articles
hartung
Daniel LaGrow
Christopher Taverna
Owned by
hartung
Last updated:
Aug 12, 2024
by
Daniel LaGrow
1 min read
Loading data...
Add how-to article
How-to article
Provide step-by-step guidance for completing a task.