Search19 Results

This article contains information for students on using the Respondus LockDown browser. Respondus LockDown Browser is a custom web browser that locks down the testing environment within Blackboard; test-takers are unable to print, copy, go to another URL, or access other applications. When an assessment is started, students are locked into it until they submit for grading. It is compatible with Mac and Windows.
Respondus LockDown Browser is a custom browser that locks down the testing environment within Blackboard. When students use Respondus LockDown Browser they are unable to print, copy, go to another URL, or access other applications. When an assessment is started, students are locked into it until they submit for grading. Compatible with Mac and Windows.
Respondus LockDown Browser is a custom browser that locks down the testing environment within Blackboard. When students use Respondus LockDown Browser they are unable to print, copy, go to another URL, or access other applications. When an assessment is started, students are locked into it until they submit for grading. Compatible with Mac and Windows.
This KB article indicates which settings should be selected in order to secure a Zoom meeting while giving a presentation.
The following measures will increase the security of your Zoom sessions and reduce the chance of unwanted attendees. We recommend using as many of these options as you reasonably can without impacting your meeting operations. If you are discussing any sensitive or confidential information in your meetings, these measures become that much more important.
There are four core features of the Collaborate platform that help ensure a secure virtual classroom experience.  We recommend using as many of these options as you reasonably can without impacting your meeting operations. If you are discussing any sensitive or confidential information in your meetings, these measures become that much more important.
Need to report a phishing email? These steps will show you how to use the Phish Notify button within your O365 email account.
There are other types of phishing attacks that attackers use. Here is information on four that have been used at this university.
There has been an increase in phishing, fraud, and scam emails. Currently, this has taken the form of fraudulent job postings. Fake job postings come as unsolicited emails sent directly to your account or through an online job listing sites. We advise students, faculty, and staff to avoid being scam victims by following these guidelines:
UND UIT configures computers across campus to meet the needs of faculty and staff, all while staying secure, and manageable. Each are configured with the following in mind; remote desktop support, maintenance, security, and asset management.
Here are some helpful tips to protect yourself and sensitive data during the Holidays.
Per UND Endpoint Security Software Policy, exemptions from the policy will need to fill out the form.
University of North Dakota (UND) community travelers should limit the amount of sensitive information stored on or accessible to any device being used and taken on a trip. Travelers should avoid contact with the University of North Dakota network in general, specifically when traveling to high-risk countries (see U.S. State Department's Alerts and Warnings).
Before traveling out of the country, remember to contact UND’s Export Control Manager (Michael Sadler; michael.p.sadler@UND.edu) to ensure
Phishing email messages, websites, and phone calls are designed to steal money. Cybercriminals can do this by installing malicious software on your computer or stealing personal information off of your computer. More often than not, phishing messages follow a standard framework that can be easy to spot if you now what you’re looking for.