
Virtual Private Network
Learn more
Virtual Private Network
Northwestern’s VPN service allows students, faculty, and staff to access University resources securely while using non-Northwestern networks to connect to the internet.
Connect to VPN
Northwestern IT and security teams across the University are partnering to promote best practices and behaviors that help students, faculty, and staff prepare to connect, protect, and secure Northwestern against cybercriminals' attempts to harvest sensitive information.
Throughout the year-long effort, learn how to protect yourself better when it comes to securing mobile devices, generating stronger passwords, avoiding phishing scams, and more with help from Northwestern IT and a host of security resources that are always just a click away. Watch for details in the Northwestern IT newsletter, follow along on Twitter and Facebook, and read the Information Security Office's blog for updates on a range of topics to ensure we continue to learn, teach, and work in a safe online environment.
Learn more
Northwestern’s VPN service allows students, faculty, and staff to access University resources securely while using non-Northwestern networks to connect to the internet.
Connect to VPN
Learn more
You use your devices to store and process sensitive information every day, which makes securing your devices a critical part of securing your identity and data.
Secure Your Devices
Learn more
Though you may not realize it, you are constantly verifying your identity to access and make changes to information.
Protect Your Identity
Learn more
Northwestern IT provides Multi-factor Authentication technology, adding a critical extra layer of login protection for some Northwestern systems.
Learn About Duo
Learn more
Zoom offers many features that can increase your sessions' security and reduce the chance of unwanted attendees from disrupting your event.
Protect Your Meeting
Learn more
Northwestern IT provides comprehensive, convenient, and secure services to support the needs of University students, faculty, and staff both on- and off-campus.
Are you set up?
Learn more
Sharing media is not illegal if you have the right to distribute the content. However, many file-sharing applications are used to access copyrighted material illegally.
What should you do?
Learn more
Email scams and phishing messages are electronic fraud types that ask recipients to disclose information or perform other potentially harmful actions.
Don't Get Hooked
Learn more
A positive online reputation is vital in today's digital world. Like it or not, your information is everywhere. What you can do is help to control it and what it says about you.
What to Do
Learn more
There is no denying that new devices are fun, but while there are more opportunities to interact with people, share information, and stay connected, we also need to be aware of the risks these "things" may introduce.
How Are You Connected?
Learn more
There are a variety of file-sharing solutions for effective collaboration among members of the University community as well as with external colleagues.
What's Best for You
Learn more
Traveling with digital devices is often necessary to stay connected while you are away from the office or home. Here are several tips to keep you secure while traveling.
Before You Go