Janet Eaton, Information Assurance

Janet Eaton, Information Assurance

Contact Janet at jmfeaton@umich.edu.

Prepare to move away from Windows Server 2008, 2008 R2

Microsoft will end support for Windows Server 2008 and 2008 R2 on January 14, 2020 That means it will no longer provide security updates or support. Don’t let your infrastructure and applications go unprotected. Begin planning now to upgrade as needed. This applies to physical servers that you manage as well as virtual servers.  MiServer users are asked… Read More »

Better protection for U-M networks

ITS began implementing components of a greatly enhanced network security threat detection and mitigation system in late June. This approach combines cutting edge technologies, open source tools, and U-M’s MITN threat intelligence framework to provide a security solution that scales across U-M networks. It will allow ITS to:  Detect and mitigate network threats across more U-M networks.  Extend… Read More »

U-M IT security posture information published

Have external collaborators, granting agencies, or vendor partners ever asked you for information about the university’s IT security posture? ITS Information Assurance has pulled together an overview of how we secure U-M into one document to help you answer those questions: U-M IT Security Posture (U-M login required)Note: IT security and compliance is a shared responsibility. This document… Read More »

Reveal short URLs, use them with caution

Shortened URLs, such as those from bit.ly and goo.gl, make it easy to type in a web address quickly but hard to tell where your web browser will actually take you. Before clicking a shortened URL, check for the full URL. Most URL shorteners—including those used at U-M—include a preview feature. In addition, there are several URL checkers… Read More »

Your role in implementing new info security standards

No matter what your job at U-M, you have a role to play in implementing the new information security standards and the revised Information Security (SPG 601.27) policy. Your responsibilities could include: Participating in data protection training Reporting suspected or actual IT security incidents Learning and using secure coding best practices Configuring systems to meet minimum security requirements… Read More »

Tips for writing emails that don’t look phishy

You have an important university email to send, but how do you craft it so it looks like the official, trustworthy, communication it is? In other words, how do you keep people from thinking it is a phish? Email users are rightfully suspicious of unsolicited email, but that can sometimes cause them to ignore or delete your important,… Read More »

New Chinese restriction impacts Duo phone calls; Use other options

May 15, 2019 update: You can once again use the Call Me option to receive Duo phone calls to Chinese (+86) numbers for two-factor authentication. Automated phone calls for Duo two-factor authentication are no longer being blocked to Chinese (+86) numbers. Duo worked with one of its telephony providers and the Chinese government to resolve the issue. China… Read More »

Teams practice IT security incident investigation

U-M staff members, and a number of other IT security pros from Domino’s, and Washtenaw Community College, honed their IT security investigation skills at a March 27 Boss of the SOC (Security Operations Center) event held at U-M and sponsored by the U-M Information Assurance office and Splunk. Working in teams of four to five, participants assumed the… Read More »

IA finds and fixes Shibboleth vulnerability

Imagine not being able to log in to your U-M GMail and Calendar—or Box at U-M, Canvas, and more. That might have been a risk if an attacker had exploited a previously unknown Shibboleth vulnerability. Within minutes, the attacker could have broadly disrupted logins at U-M and across higher education. Thankfully, that didn’t happen. While doing a routine… Read More »

Learn about implementing new info security standards

How do the new information security standards and the revised Information Security (SPG 601.27) policy affect your work? Information Assurance (IA) is hosting working sessions for members of the U-M community interested in learning about implementing the policy and standards. Upcoming sessions: Thursday, April 4 (1:30-3:30 p.m.). This session will cover Security Log Collection, Analysis, and Retention (DS-19)… Read More »

Active Directory test forest ready for your testing

In preparation for upgrading the Active Directory (UMROOT) domain controllers from Windows Server 2012 to Windows Server 2016, the Active Directory test forest has been upgraded to Windows Server 2016. It is ready for you to use to test your systems and applications. If you are responsible for services that use Active Directory (UMROOT), please do the following… Read More »

IA Chrome extension protecting LSA

About 2,100 managed systems in the College of Literature, Science, and the Arts (LSA) now have extra protection from malicious websites thanks to the Safe Computing Website Checker developed by Information Assurance (IA). The extension protects people from some types of malicious websites when browsing the web with Chrome. “Utilizing Group Policy Management (GPO) we have deployed this… Read More »

Only store sensitive data in approved services—check the guide!

Do you work with sensitive data? Any time you are thinking about using a storage or collaboration service for sensitive university data—whether in the cloud or at U-M: Check the Sensitive Data Guide first to see which services are approved for your data type. If the service you want to use is not listed in the guide, ask… Read More »