Use the security guides to find tips, tools, and best practices for securing both Duke and personal computing.

PERSONAL DEVICE SECURITY GUIDE

Learn how to secure personal devices and accounts using security tools and practices such as antivirus, patching, authentication, device tracking and more.

DATA SECURITY GUIDE

In this guide learn more about classifying Duke data, finding approved services and securing systems that store or process Duke data.

Email Security GUIDE

Learn to spot common phishing scams and how to report suspicious emails with the "Report Phish to Duke" button.

SECURE ACCESS GUIDE

Learn more about choosing and managing passwords and using multifactor authentication. Find out what to do if your NetID is locked. 

SAFE BROWSING GUIDE

Find out how to spot suspicious websites and secure your web browser.

STAY SAFE WHILE TRAVELING

Find out how to connect securely to Duke resources while traveling, such as through use of VPN or eduroam. Learn more about protecting Duke data and securing devices when traveling. 

MOBILE DEVICE SECURITY GUIDE

Recommendations to ensure that data on mobile devices is secured to the greatest extent possible.

DUKE-OWNED DEVICES: NETWORK REQUIREMENTS GUIDE

(Applicable to Duke University devices) Duke-owned computers and servers must adhere to Duke security standards to ensure continued access to the Duke network. 

PROTECT AGAINST IDENTITY THEFT

Learn steps to protect your identity and what to do if you believe your identity has been stolen. 

Wireless Security at Home

Tips for securing your home wireless network. 

Security for Printers, Scanners, Copiers and Fax Machines

Printers, copiers, and other multi-function network devices can pose a security risk if not properly configured. 

Zoom Security and Privacy

OIT provides a guide on how to protect your meetings by using Zoom's security settings. 

COPYRIGHT AND DIGITAL MILLENNIUM COPYRIGHT ACT

Understand how Duke complies with the provisions of the Digital Millennium Copyright Act (DMCA) and what to do if you have a concern regarding the use of copyrighted material on any site on the Duke network.

QR CODES

Understand how to consider QR codes and best practices for using them at Duke.

Data Flow SEcurity guide

Learn how to handle data at Duke University safely and securely by understanding the risks, best practices, and Duke policies associated with moving data in and out of Duke systems.