Learn about avoiding email scams, protecting your devices and where to get to help if you've been hacked.
Learn to recognize a phishing attempt, what is a suspicious email and what to avoid.
Connect to UB resources and protect your personal information from off campus using UB VPN AnyConnect.
Don't let your device get compromised. Microsoft and Apple recommend applying your operating system updates.
Compliance at UB involves ensuring that we adhere to internal policies, as well as state and federal laws. Read the UB Computer and Network Use policy and learn more about what are your responsibilities and the secure information lifecycle.
Find instructions for disposing old equipment and cleaning off your computer before you recycle it.
Contact the UBIT Help Center.
Becoming familiar with how Facebook works and other social media is important. Here are some safeguards.
Invest in a laptop lock to physically secure it and you can purchase software such as LoJack so your laptop can be tracked and possibly recovered if stolen.
Read our Web Browser Hardening Recommendations.
If you are using a peer-to-peer (P2P) file-sharing program or have set up an ftp server, make sure that you are not "serving" copyright-protected materials to the world. If the University is notified by policing organizations such as the RIAA, MPAA, or their agents, you will be requested to appear at UB's Computer Discipline Office to discuss the complaint. Failure to appear could result in deactivation of your UBIT privileges. Learn more about the Digital Millienilum Copyright Act (DMCA).