Janet Eaton, ITS Information Assurance

Janet Eaton, ITS Information Assurance

Contact Janet at jmfeaton@umich.edu.

Use the new Safe Computing Curriculum in your unit

As U-M employees and community members, we all share in the responsibility to help protect U-M IT systems and data. But how do you do that? ITS Information Assurance has developed a Safe Computing Curriculum that offers IT security and privacy/confidentiality best practices to help safeguard the university’s digital assets.

AI – transformative and biased, say U-M panelists

A panel of U-M experts discussed the film “Coded Bias” at a Dissonance Event on April 15. “Coded Bias” follows the journey of Joy Buolamwini, a computer scientist and digital activist based at the MIT Media Lab, as she worked with others to push for the first legislation in the U.S. to govern against bias in artificial intelligence (AI) algorithms. The Dissonance organizing committee brought the panelists together for an online discussion of bias in AI, transformative opportunities for its use, and more.

“Coded Bias” watch event; Join experts for panel discussion afterwards

You are invited to a free, on-demand screening of the documentary film Coded Bias—available anytime from April 8 to 14 and a panel discussion of the film April 15. Coded Bias explores the fallout from an MIT Media Lab researcher’s discovery that facial recognition does not identify dark-skinned faces and women’s faces accurately. The film follows her journey to push for the first legislation in the U.S. to govern against bias in the algorithms.

Renew extended support if you are still running Windows 7 or Server 2008

If you purchased extended support for university machines running Windows 7 or Server 2008 in January 2020, be aware that the support is about to expire. You will need to update the machines to a supported version of Windows or Windows Server, purchase another year of extended support, decommission the machines, or isolate them on a protected network.

New UMICH password strength requirements

Next time you change or reset your UMICH (Level-1) password, you will need to meet new password strength requirements. Existing passwords are not affected by the new requirements and can remain as is. The new requirements align with current best practices and National Institute of Standards and Technology (NIST) guidelines for passwords. Given the sophistication of attempted attacks… Read More »

Duo for U-M VPN now available

You can now use Duo two-factor protection with the U-M Virtual Private Network (VPN). With faculty, staff, and students already benefiting from Duo two-factor authentication at Weblogin, ITS is working to further extend this protection to other university services. Try it now on your personal computer Visit ITS: Getting Started With VPN and choose your operating system to… Read More »

Increase in emails impersonating U-M deans and other employees

ITS Information Assurance is seeing an increase in fraudulent emails that appear to come from U-M deans, employees and offices. These fraudulent emails use a practice known as “spoofing.” Different versions of these emails ask the recipient to: Quickly arrange for gift cards to cover a university expense Reply if you are available Make an immediate wire transfer… Read More »

Write emails that don’t look phishy

Given the current infodemic related to the COVID-19 pandemic, it is harder than ever to get your important university information through to the people who need it. People are rightfully suspicious of unsolicited email, but that can sometimes cause them to ignore or delete your important, legitimate communications. Focus on helping recipients verify the legitimacy of your U-M… Read More »

Vulnerability scans now monthly, adding internal scans

To better help you secure your unit networks, ITS Information Assurance (IA) is increasing the frequency of its universitywide scans and adding internal network scanning. As of May, universitywide vulnerability scans are now performed monthly instead of quarterly. The monthly scans will be similar to previous quarterly scans. The software begins by performing a TCP and UDP probe… Read More »