  {"id":70,"date":"2020-04-15T12:15:48","date_gmt":"2020-04-15T22:15:48","guid":{"rendered":"https:\/\/www.hawaii.edu\/testinfosec\/?page_id=70"},"modified":"2026-02-13T11:37:45","modified_gmt":"2026-02-13T21:37:45","slug":"resources-tips","status":"publish","type":"page","link":"https:\/\/www.hawaii.edu\/infosec\/resources-tips\/","title":{"rendered":"Resources &amp; Tips"},"content":{"rendered":"<div class=\"container\">\n<div class=\"row\">\n<div class=\"col-sm-4\">\n<h2>Best Practices<\/h2>\n<ul>\n<li><a href=\"personal-security-checklist\/\">Start Here! Personal Security Checklist<\/a><\/li>\n<li><a href=\"..\/research-security\/\">Protecting Research Data<\/a><\/li>\n<li><a href=\"\/infosec\/working-remotely\/\">Security Guidelines for Remote Work<\/a><\/li>\n<li><a href=\"https:\/\/www.hawaii.edu\/infosec\/resources-tips\/dropbox-filedrop-best-practices\/\">Âé¶¹´«Ã½Enterprise Dropbox and FileDrop<\/a><\/li>\n<li><a href=\"https:\/\/www.hawaii.edu\/its\/information\/survey\/\">Personal Information Survey <i class=\"fa fa-external-link\" aria-hidden=\"true\"><\/i><\/a><\/li>\n<li><a href=\"https:\/\/www.hawaii.edu\/its\/device\/registration\/\">Device Registration <i class=\"fa fa-external-link\" aria-hidden=\"true\"><\/i><\/a><\/li>\n<li><a href=\"writing-professional-emails\/\">Writing Professional Emails<\/a><\/li>\n<li><a href=\"..\/international-travel\">International Travel Best Practices<\/a><\/li>\n<li><a href=\"mobile-device-security\/\">Mobile Device Security<\/a><\/li>\n<li><a href=\"auto-deleting-files-in-recycle-bin\/\">Auto Deleting Files from the Recycle Bin<\/a><\/li>\n<\/ul><\/div>\n<div class=\"col-sm-4\">\n<h2>Security Topics<\/h2>\n<ul>\n<li><a href=\"https:\/\/www.hawaii.edu\/infosec\/ncsam-2025\/\">National Cybersecurity Awareness Month (NCSAM) 2025<\/a><\/li>\n<li><a href=\"password-manager\/\">Password Managers<\/a><\/li>\n<li><a href=\"encryption\/\">Encryption<\/a><\/li>\n<li><a href=\"..\/phishing\/\">Phishing \u2014 Stay Safe Online!<\/a><\/li>\n<li><a href=\"..\/spearphishing\/\">Spearphishing<\/a><\/li>\n<li><a href=\"..\/awareness\/identity-theft\/\">Identity Theft<\/a><\/li>\n<li><a href=\"..\/awareness\/unemployment-fraud\/\">Unemployment Fraud Alert<\/a><\/li>\n<p>                <!--Spirion: https:\/\/www.hawaii.edu\/infosec\/resources-tips\/spirion\/--><\/p>\n<li><a href=\"https:\/\/www.hawaii.edu\/infosec\/resources-tips\/cybersecurity-flyers\/\">Cybersecurity Flyers<\/a><\/li>\n<\/ul><\/div>\n<div class=\"col-sm-4\">\n<h2>ITS Services<\/h2>\n<ul>\n<li><a href=\"https:\/\/www.hawaii.edu\/filedrop\/\">Âé¶¹´«Ã½FileDrop <i class=\"fa fa-external-link\" aria-hidden=\"true\"><\/i><\/a><\/li>\n<li><a href=\"https:\/\/www.hawaii.edu\/askus\/819\">Âé¶¹´«Ã½VPN <i class=\"fa fa-external-link\" aria-hidden=\"true\"><\/i><\/a><\/li>\n<li><a href=\"https:\/\/www.hawaii.edu\/infosec\/resources-tips\/spirion\/\">Spirion <i class=\"fa fa-external-link\" aria-hidden=\"true\"><\/i><\/a><\/li>\n<li><a href=\"https:\/\/scanuh.hawaii.edu\/\">ScanÂé¶¹´«Ã½Vulnerability Scanner <i class=\"fa fa-external-link\" aria-hidden=\"true\"><\/i><\/a><\/li>\n<li><a href=\"https:\/\/www.hawaii.edu\/infosec\/assets\/vuln-scan\/\">Vulnerability Scanning Tools Guide <i class=\"fa fa-external-link\" aria-hidden=\"true\"><\/i><\/a><\/li>\n<li><a href=\"https:\/\/www.hawaii.edu\/infosec\/it-security-alerts\/\">IT Security Alerts Listserv <i class=\"fa fa-external-link\" aria-hidden=\"true\"><\/i><\/a><\/li>\n<li><a href=\"https:\/\/www.hawaii.edu\/infosec\/dropbox\/\">Âé¶¹´«Ã½Enterprise Dropbox <i class=\"fa fa-external-link\" aria-hidden=\"true\"><\/i><\/a><\/li>\n<li><a href=\"https:\/\/www.hawaii.edu\/askus\/1758\">Set up Multi-Factor Authentication (MFA) <i class=\"fa fa-external-link\" aria-hidden=\"true\"><\/i><\/a><\/li>\n<li><a href=\"\/infosec\/proofpoint\">Proofpoint @ UH<\/a><\/li>\n<li><a href=\"https:\/\/www.hawaii.edu\/infosec\/assets\/sentinelone\/\">SentinelOne <i class=\"fa fa-external-link\" aria-hidden=\"true\"><\/i><\/a><\/li>\n<\/ul><\/div>\n<\/p><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Best Practices Start Here! Personal Security Checklist Protecting Research Data Security Guidelines for Remote Work Âé¶¹´«Ã½Enterprise Dropbox and FileDrop Personal Information Survey Device Registration Writing Professional Emails International Travel Best Practices Mobile Device Security Auto Deleting Files from the &hellip; <\/p>\n","protected":false},"author":86,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-onecolumn.php","meta":{"footnotes":""},"class_list":["post-70","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.hawaii.edu\/infosec\/wp-json\/wp\/v2\/pages\/70","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hawaii.edu\/infosec\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.hawaii.edu\/infosec\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.hawaii.edu\/infosec\/wp-json\/wp\/v2\/users\/86"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hawaii.edu\/infosec\/wp-json\/wp\/v2\/comments?post=70"}],"version-history":[{"count":42,"href":"https:\/\/www.hawaii.edu\/infosec\/wp-json\/wp\/v2\/pages\/70\/revisions"}],"predecessor-version":[{"id":2615,"href":"https:\/\/www.hawaii.edu\/infosec\/wp-json\/wp\/v2\/pages\/70\/revisions\/2615"}],"wp:attachment":[{"href":"https:\/\/www.hawaii.edu\/infosec\/wp-json\/wp\/v2\/media?parent=70"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}