- Knowledge Base
- Technology
In order to gain access to TWU data, your account is required to have a complex password. The purpose of this guide is to help create a strong password.
- Knowledge Base
- Technology
- Software
- RingCentral
- Phones
RingCentral features options for IVR (interactive voice response) otherwise known as a call-tree or menu system. When designing an IVR, consider these best practices to provide information and appropriate call routing.
- Knowledge Base
- Technology
- Security
In order to follow proper data security, Texas Woman's University has redaction rules that should be followed whenever Social Security Number (SSN) or Date of Birth (DOB) must be redacted. Those rules are outlined here.
- Knowledge Base
- Technology
- Security
Windows 10 comes with BitLocker, a tool that makes it easy to encrypt your USB drive
- Knowledge Base
- Technology
- Email
Phishing is the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.