1. Guide for Using Campus Resources Remotely
  2. Storage - Data Storage Guidelines
  3. Information Security Program - Sec 3: Specific Compliance with FTC Safeguard Rules
  4. Information Security Program - Sec. 2: Access, Security, and Control of Data and Information Policy
  5. Information Security Program - Sec. I: Privacy Protection
  6. Security - Duo Phone Re-Activation (New Phone with Same Number)
  7. Security - Duo Phone Activation (New Phone with New Number)
  8. Software Requirements - University owned computers
  9. Security - Responding to a Duo notification you did not initiate
  10. Security - Enrolling in Duo and Managing your Devices
  11. Security - Enrolling in Duo Using Your Mobile Device
  12. Security - Two-factor Authentication (Duo) FAQ
  13. Purchasing - Tech (Students/Parents)
  14. Tips - Avoiding the Phishing Net
  15. NetID and Password - Password Requirements & Expiration
  16. PASS - Requesting PASS Access FAQ
  17. Security -- Spear Phishing
  18. Policy - Copyright and Fair Use
  19. Policy - UW-Platteville Sanctions for Copyright Violations
  20. File and Print Sharing - How to disable
  21. Security - Duo Two-Factor Authentication: "Additional identity proofing is required" Error Message
  22. Antivirus - Information about antivirus software
  23. ITS Communications - Scheduled Outages
  24. Zoom - Managing unwanted guests
  25. TIPS - Locking your computer screen
  26. Security - Staying Safe in "the Cloud"
  27. Collaborative Integration -- Tech Support
  28. Collaborative Integration - Completed Tasks
  29. Security - AMP Data Collection Summary at UW
  30. Policy - Acceptable Use of Information Technology Resources
  31. NetID and Password - Password Self-Service
  32. Virus/Malware Removal (PC)
  33. Security - Example: Phishing attempt 01.24.18
  34. Security - Example: Phishing attempt threats to shut down your mailbox 01.24.17
  35. Security - Example: Phishing Attempt 09.09.16
  36. Security - Example: Phishing attempt 02.02.18
  37. Security - Example: Phishing Attempt 05.03.17
  38. Security - EXAMPLE: Phishing attempt 07.19.16
  39. Security - Example: Phishing Attempt 05.17.16
  40. Security - Example: Phishing Attempt 10.29.17
  41. Security - Example: Phishing attempt 12.13.16
  42. Security - Example: Phishing Attempt 02.25.17
  43. Security - Example: Phishing attempt 06.16.17
  44. Security - Example: Phishing attempt 03.20.17
  45. Security - Example: Phishing attempt 07.20.16
  46. Security - Example: Phishing Attempt 05.20.16
  47. Security - Example: Phishing attempt 07.20.17
  48. Security - Example: Phishing attempt 01.10.18
  49. Security - Example: Phishing attempt 01.31.18
  50. Security - Example: Phishing attempt 06.28.18
  51. Security - Example: Phishing Attempts 03.14.17
  52. Security - Example: Phishing Attempt 10.07.14
  53. Security - Example: Phishing Attempt Sept 24, 2014
  54. Security - Example: Phishing attempt 06.03.16
  55. Security - Example: Phishing Attempt Sept 27, 2014
  56. Security - Example: Phishing attempt 02.28.17
  57. Security - Example: Phishing attempt 11.15.17
  58. Security - Example: Phishing attempt warns of critical email security alert 01.25.18
  59. Security - Example: Phishing attempt 04.24.18
  60. Security - Example: Phishing Attempt 11.17.16
  61. Security - Example: Phishing Attempt 06.15.17
  62. Security - Example: Phishing Attempt 09.02.16
  63. Security - Example: Phishing attempt 07.12.16
  64. Security - Example: Phishing Attempt 03.09.16
  65. Security - Example: Phishing attempt 11.02.17
  66. Residence Hall Card Access FAQ
  67. BI - Application for Access Form
  68. Office 365 - Obtaining Message Headers to Report Phishing (OWA)
  69. Unsupported Hardware
  70. Office 365 - Obtain Message Headers to Report Phishing - Plain Text
  71. Office 365 - Obtain Message Source to Report Phishing - HTML