  {"id":70,"date":"2020-04-15T12:15:48","date_gmt":"2020-04-15T22:15:48","guid":{"rendered":"https:\/\/www.hawaii.edu\/testinfosec\/?page_id=70"},"modified":"2026-04-22T15:09:21","modified_gmt":"2026-04-23T01:09:21","slug":"resources-tips","status":"publish","type":"page","link":"https:\/\/www.hawaii.edu\/infosec\/resources-tips\/","title":{"rendered":"Resources &amp; Tips"},"content":{"rendered":"<div class=\"container\">\n<div class=\"row\">\n<div class=\"col-sm-4\">\n<h2>Best Practices<\/h2>\n<ul>\n<li><a href=\"personal-security-checklist\/\">Start Here! Personal Security Checklist<\/a><\/li>\n<li><a href=\"..\/research-security\/\">Protecting Research Data<\/a><\/li>\n<li><a href=\"\/infosec\/working-remotely\/\">Security Guidelines for Remote Work<\/a><\/li>\n<li><a href=\"https:\/\/www.hawaii.edu\/infosec\/resources-tips\/dropbox-filedrop-best-practices\/\">东精影业 Enterprise Dropbox and FileDrop<\/a><\/li>\n<li><a href=\"https:\/\/www.hawaii.edu\/its\/information\/survey\/\">Personal Information Survey <i class=\"fa fa-external-link\" aria-hidden=\"true\"><\/i><\/a><\/li>\n<li><a href=\"https:\/\/www.hawaii.edu\/its\/device\/registration\/\">Device Registration <i class=\"fa fa-external-link\" aria-hidden=\"true\"><\/i><\/a><\/li>\n<li><a href=\"writing-professional-emails\/\">Writing Professional Emails<\/a><\/li>\n<li><a href=\"..\/international-travel\">International Travel Best Practices<\/a><\/li>\n<li><a href=\"mobile-device-security\/\">Mobile Device Security<\/a><\/li>\n<li><a href=\"auto-deleting-files-in-recycle-bin\/\">Auto Deleting Files from the Recycle Bin<\/a><\/li>\n<\/ul><\/div>\n<div class=\"col-sm-4\">\n<h2>Security Topics<\/h2>\n<ul>\n<li><a href=\"https:\/\/www.hawaii.edu\/infosec\/ncsam-2025\/\">National Cybersecurity Awareness Month (NCSAM) 2025<\/a><\/li>\n<li><a href=\"password-manager\/\">Password Managers<\/a><\/li>\n<li><a href=\"encryption\/\">Encryption<\/a><\/li>\n<li><a href=\"..\/phishing\/\">Phishing \u2014 Stay Safe Online!<\/a><\/li>\n<li><a href=\"..\/spearphishing\/\">Spearphishing<\/a><\/li>\n<li><a href=\"..\/awareness\/identity-theft\/\">Identity Theft<\/a><\/li>\n<li><a href=\"..\/awareness\/unemployment-fraud\/\">Unemployment Fraud Alert<\/a><\/li>\n<p>                <!--Spirion: https:\/\/www.hawaii.edu\/infosec\/resources-tips\/spirion\/--><\/p>\n<li><a href=\"https:\/\/www.hawaii.edu\/infosec\/resources-tips\/cybersecurity-flyers\/\">Cybersecurity Flyers<\/a><\/li>\n<\/ul><\/div>\n<div class=\"col-sm-4\">\n<h2>ITS Services<\/h2>\n<ul>\n<li><a href=\"https:\/\/www.hawaii.edu\/infosec\/sentinelone\/\">SentinelOne <i class=\"fa fa-external-link\" aria-hidden=\"true\"><\/i><\/a><\/li>\n<li><a href=\"https:\/\/www.hawaii.edu\/infosec\/spirion\/\">Spirion <i class=\"fa fa-external-link\" aria-hidden=\"true\"><\/i><\/a><\/li>\n<li><a href=\"https:\/\/www.hawaii.edu\/infosec\/tenable\">Tenable <i class=\"fa fa-external-link\" aria-hidden=\"true\"><\/i><\/a><\/li>\n<li><a href=\"https:\/\/www.hawaii.edu\/filedrop\/\">东精影业 FileDrop <i class=\"fa fa-external-link\" aria-hidden=\"true\"><\/i><\/a><\/li>\n<li><a href=\"https:\/\/www.hawaii.edu\/askus\/819\">东精影业 VPN <i class=\"fa fa-external-link\" aria-hidden=\"true\"><\/i><\/a><\/li>\n<li><a href=\"https:\/\/www.hawaii.edu\/infosec\/it-security-alerts\/\">IT Security Alerts Listserv <i class=\"fa fa-external-link\" aria-hidden=\"true\"><\/i><\/a><\/li>\n<li><a href=\"https:\/\/www.hawaii.edu\/infosec\/dropbox\/\">东精影业 Enterprise Dropbox <i class=\"fa fa-external-link\" aria-hidden=\"true\"><\/i><\/a><\/li>\n<li><a href=\"https:\/\/www.hawaii.edu\/askus\/1758\">Set up Multi-Factor Authentication (MFA) <i class=\"fa fa-external-link\" aria-hidden=\"true\"><\/i><\/a><\/li>\n<li><a href=\"\/infosec\/proofpoint\">Proofpoint @ 东精影业<\/a><\/li>\n<li><a href=\"https:\/\/scanuh.hawaii.edu\/\">ScanUH Self-Service Vulnerability Scanner <i class=\"fa fa-external-link\" aria-hidden=\"true\"><\/i><\/a><\/li>\n<\/ul><\/div>\n<\/p><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Best Practices Start Here! Personal Security Checklist Protecting Research Data Security Guidelines for Remote Work UH Enterprise Dropbox and FileDrop Personal Information Survey Device Registration Writing Professional Emails International Travel Best Practices Mobile Device Security Auto Deleting Files from the &hellip; <\/p>\n","protected":false},"author":86,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-onecolumn.php","meta":{"footnotes":""},"class_list":["post-70","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.hawaii.edu\/infosec\/wp-json\/wp\/v2\/pages\/70","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hawaii.edu\/infosec\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.hawaii.edu\/infosec\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.hawaii.edu\/infosec\/wp-json\/wp\/v2\/users\/86"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hawaii.edu\/infosec\/wp-json\/wp\/v2\/comments?post=70"}],"version-history":[{"count":44,"href":"https:\/\/www.hawaii.edu\/infosec\/wp-json\/wp\/v2\/pages\/70\/revisions"}],"predecessor-version":[{"id":2665,"href":"https:\/\/www.hawaii.edu\/infosec\/wp-json\/wp\/v2\/pages\/70\/revisions\/2665"}],"wp:attachment":[{"href":"https:\/\/www.hawaii.edu\/infosec\/wp-json\/wp\/v2\/media?parent=70"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}