mso.harvard.edu
Training Information | Office 365 for Harvard
http://mso.harvard.edu/training-information
Skip to main content. Harvard University Information Technology. Office 365 for Harvard. SharePoint For Harvard offers a variety of learning options for Users and Site Owners including self-paced training videos and guides, user manuals, as well as Lynda.com resources. Microsoft also offers an extensive number of downloadable Training Courses for SharePoint Sites. It is recommended that all SharePoint users review the 'beginner' training resources located here. And this Quick Start Guide.
iam.harvard.edu
HUIT IAM Policies & Standards | Identity & Access Management
http://iam.harvard.edu/resources/iam-policies-standards
Skip to main content. Harvard University Information Technology. Identity and Access Management. IAM Policies and Standards. HUIT IAM Policies and Standards. You can also view a print-friendly version of these standards and policies (also suitable for screen readers) here. 20 IAM Policies and Standards. The policies and standards outlined below only include people (not processes or devices). HUIT IAM shall maintain HUIDs uniquely identifying those individuals who are approved to be assigned them. Securel...
mso.harvard.edu
Training Information | Office 365 for Harvard
http://mso.harvard.edu/training-information-0
Skip to main content. Harvard University Information Technology. Office 365 for Harvard. OneDrive for Business is a place where you can store, sync, and share your work files. As part of Office 365, OneDrive for Business lets you update and share your files from anywhere and work on Office documents with others at the same time. For training information we suggest the following resources:. Office 365 Learning Center. Lyndacom One Drive Training Videos. Inquiry for an instructor led OneDrive demo class.
security.harvard.edu
Resources | Information Security
http://security.harvard.edu/pages/resources
Skip to main content. A variety of support tools are available for learning about and implementing information security policies. Recommendations for specific action in situations including data breach. Requests for information or exemptions, checklists for security assurance, compliance assessment forms, etc. Process, product, and vendor recommendations. Guidance on resetting your password for many Harvard systems. A list of commonly used terms and their definitions. 1414 Massachusetts Avenue, 3rd Floor.
security.harvard.edu
LastPass Security Incident Notifications | Information Security
http://security.harvard.edu/blog/lastpass-security-incident-notifications
Skip to main content. LastPass Security Incident Notifications. June 16, 2015. LastPass is the preferred password manager recommended by Harvard University Information Security. If you use LastPass, you may have received a security notification regarding a security incident disclosed on Monday June 15th that involves LastPass servers. Cyber criminals illegally accessed LastPass servers and stole the following information:. Server side salts and authentication hashes (Pieces of the encryption process).
security.harvard.edu
Data Classification Table | Information Security
http://security.harvard.edu/dct
Skip to main content. Data Classification and Examples (abridged version). Information that would cause severe harm to individuals or the University if disclosed. Research information classified as Level 5 by an IRB or otherwise required to be stored or processed in a high security environment and on a computer not connected to the Harvard data networks. Certain individually identifiable medical records and genetic information, categorized as extremely sensitive. HUIDs associated with names or any other ...
security.harvard.edu
Use Strong Passwords | Information Security
http://security.harvard.edu/use-strong-passwords
Skip to main content. Create passwords that are unique and hard to guess. Use 2-step verification where it is available. A password is how you prove you are you. Technology has gotten better and better, isn't it time to improve the way you handle passwords? Read the links below to help you create a strong password, manage all your passwords in a password manager, and enable two-step verification to protect against account theft. Create a Strong Password. Bad - Things to Avoid. Footballfan, hockey, gosox.
security.harvard.edu
Services | Information Security
http://security.harvard.edu/pages/services
Skip to main content. Through a combination of local security officer expertise and certified information security professionals from HUIT, all Schools and departments are able to have the appropriate level of protection for their teaching, learning, research and business information. Contact a School Security Officer. For information on the services available to you. HUIT IT Security services are available to all schools and departments. Please contact ithelp@harvard.edu. Issues and manages Harvard’s di...
security.harvard.edu
Click Wisely | Information Security
http://security.harvard.edu/click-wisely
Skip to main content. Click only links and files that are expected, and only from people you trust. There is a reason so many cyber attacks start with a bogus email message. It works. This type of scam is called phishing, and the goal is to get you to click a fraudulent link, open an unsafe file, or give up personal information. The information below will teach you how to spot a phony links and phishing scams, as well as when you should report a phishing attempt. How to Read an Address. The link's addres...
security.harvard.edu
SSL/TLS "FREAK" Technical Guidance | Information Security
http://security.harvard.edu/blog/ssl-freak-technical-guidance
Skip to main content. SSL/TLS "FREAK" Technical Guidance. March 10, 2015. For guidance on SSL/TLS "FREAK" for general users, please see the security alert at http:/ security.harvard.edu/blog/ssl-freak-vulnerability. How should server operators protect their systems against the Freak vulnerability? Disable insecure ciphers, including the RSA Export Grade ciphersuites within SSL/TLS services. In Linux, remove the following, if present:. In Apache's ssl.conf, add these to "SSLCipherSuite:".