Protect your computers and data from viruses and spyware. Find information on phishing emails and UND approved anti-virus.

Categories (7)

Internet and Wi-Fi

Find out how to connect to the UND wired and wireless networks, register your devices, or use a VPN (Virtual Private Network).


It is strongly recommended that personally owned computers connecting to the UND network have anti-virus software running at all times.

All UND owned computers connecting to UND network are required to have university’s antivirus software. UND provides SCEP (System Center Endpoint Protection) free of charge. For additional information about endpoint protection, please visit with your IT department or UND Tech Support.

Multi-Factor Authentication (MFA)

Multi-Factor authentication (MFA) is an online security system for your sensitive and personal information. It requires more than just a password for access. The goal is to create a layered defense for your data so that an unauthorized person finds it more difficult to access. If your password becomes compromised, there will be another level of security to keep your information safe.

UND uses Duo Security MFA to provide you with even better security for your sensitive information.

LiquidFiles Secure File Share

LiquidFiles should be used any time you need to transmit university private and restricted data (including personal information).

LiquidFiles Secure file share is a secure way to send files that requires the sender to login with their NDUS.identifier credentials and also complete DUO authentication. LiquidFiles can be used 1. in any browser, 2. through the Outlook plugin on Windows computers, and 3. using the LiquidFiles Agent app in your computers applications.

Policies & Procedures

There are laws and regulations that require the university to apply certain security safeguards around various categories of sensitive institutional data or information. University policies are written to support institutional compliance with these laws and regulations. All UND University IT policies and procedures can be found on the Office of the CIO's webpage at


DocuSign is a secure, paperless alternative for official document signatures. Digital document signatures help reduce the carbon footprint by reducing the amount of paper required, plus it is faster than snail mail and eliminates the hassle of finding a fax machine. DocuSign makes keeping copies as easy as saving on your computer, and it can be used on any device.

Spirion Data Security & Privacy

Spirion helps identify and remediate sensitive and restricted data on our computers. Information such as Social Security Numbers, Credit Card information, student data, etc. must be protected from exposure. The first step is to find this data. People are often surprised to find that they have restricted information on their local pc. They either weren’t aware of it or weren’t aware they had so much of it.

Articles (9)

Pinned Article Handling remote work files for Record Management

Record management considerations for remote work.

Pinned Article Recognize & Report Suspicious Emails

Phishing email messages, websites, and phone calls are designed to steal money. Cybercriminals can do this by installing malicious software on your computer or stealing personal information off of your computer. More often than not, phishing messages follow a standard framework that can be easy to spot if you now what you’re looking for.

Cybersecurity at Home

In this increasingly wireless world, the steps households should take in terms of cybersecurity have changed. Most homes now run networks of devices linked to the internet, including computers, gaming systems, TVs, tablets, and smartphones that access wireless networks. Thus, having the right tools in place will instill confidence that your family members can use the internet safely and securely for personal and work-related endeavors.

DocuSign Security FAQ

This article provides information on Docusign security and other questions before using or interacting with documents from this system.

NDUS SOC Phish Report Feedback

You received an email titled "Your phish report has been reviewed" from the NDUS SOC at This is a legit email to provide feedback when you use the Report as Phishing button. If you are unsure, please contact UND Tech Support to report your concerns.

Recognize a Phishing Email

Phishing email messages, websites, and phone calls are designed to steal money. Cyber-criminals can do this by installing malicious software on your computer or stealing personal information from your computer. More often than not, phishing messages follow a standard framework that can be easy to spot if you know what to look for. Here's a look at the anatomy of a typical phishing email

Report Phishing

Need to report a phishing email? These steps will show you how to use the Phish Notify button within your O365 email account.

Types of Phishing attacks

There are other types of phishing attacks that attackers use. Here is information on four that have been used at this university.

What is Phishing?

There has been an increase in phishing, fraud, and scam emails. Currently, this has taken the form of fraudulent job postings. Fake job postings come as unsolicited emails sent directly to your account or through an online job listing sites. We advise students, faculty, and staff to avoid being scam victims by following these guidelines: