Matt Ranville, Information Assurance

Matt Ranville, Information Assurance

You can contact Matt at mrr@umich.edu.

Participate in National Cybersecurity Awareness Month this October!

Every October, ITS Information Assurance (IA) leads a U-M celebration of National Cybersecurity Awareness Month (NCSAM) by hosting events, sharing tips, and reminding everyone of our shared responsibility to protect and secure university and personal systems and the sensitive information they contain. NCSAM is spearheaded by the National Cyber Security Alliance and the U.S. Department of Homeland Security.… Read More »

Review your MCommunity privacy settings

Your profile Your MCommunity profile shows only information related to your U-M affiliation. For U-M staff members, publicly viewable information includes: name, uniqname, email address, U-M affiliation, title, and U-M work phone number and address. You can choose privacy settings for additional information about yourself, such as your notice or description. You can choose whether the additional information… Read More »

Transfer file ownership before people leave the university

When U-M employees leave the university or transfer from one unit to another, it is important to transfer ownership of files, MCommunity groups, and other digital resources needed for university business. See these resources for tips and information: Leaving U-M U-M Termination Checklist (downloadable Excel file from U-M Human Resources) Plan ahead to avoid disruptions and protect privacy… Read More »

Encrypt your devices and data

Turn on device encryption to help secure personal and institutional data at home and at work. Encryption protects against unauthorized access to data if your device is lost or stolen. Encryption is: Required for any personal device you use to access U-M data classified as High. https://www.safecomputing.umich.edu/protect-the-u/safely-use-sensitive-data/classification-levels Recommended for any device you use to access or store U-M… Read More »

IoT devices: Balance convenience with privacy & security

Internet of Things (IoT) devices, such as smart home assistants, smart appliances, and gaming systems, can collect a lot of personal data about you—sometimes more than you might realize. Personal data about you and others who use and share such devices may be retained, used, and sold in unexpected ways. IoT devices usually send data to cloud storage… Read More »

Cryptocurrency mining risks and U-M restrictions

You may not use U-M resources—computers, networks, electricity—for cryptocurrency mining. Such use violates university policy and puts U-M services and data, and your personal accounts and devices, at risk. The Responsible Use of Information Resources (SPG 601.07) policy states that U-M resources may not be used “for personal commercial purposes or for personal financial or other gain.” The… Read More »

Participate in National Cybersecurity Awareness Month this October!

Every October, Information Assurance (IA) leads a celebration of National Cybersecurity Awareness Month (NCSAM) by hosting events, sharing tips, and reminding everyone of our shared responsibility to protect and secure university and personal systems and the sensitive information they contain. NCSAM is spearheaded by the National Cyber Security Alliance and the U.S. Department of Homeland Security. This year,… Read More »

Use antivirus software to protect U-M and personal computers

Antivirus software should be installed and kept up-to-date on all of your computers—both your own and those owned by the university. MiWorkspace computers already have antivirus software installed, and it is updated automatically. For U-M computers Information Assurance (IA) recommends these antivirus products that are licensed for use on UM-owned computers: Windows 8 and 10. Use Windows Defender,… Read More »

Transfer file ownership before people leave

When U-M employees leave the university or transfer from one unit to another, it is important to consider transferring ownership of files and other digital resources needed for university business. See these resources for tips and information: Leaving U-M U-M Termination Checklist (downloadable Excel file from U-M Human Resources) What to do if something is missed In cases… Read More »

MS Office doc dangers: Macros & enabled content pose risks

Macros are small bits of programming used in Microsoft Office docs to automate tasks. Unfortunately, they can also spread viruses and malware, and anti-virus programs cannot always catch them. Infected Office docs are typically spread through email attachments or download links, or even through cloud services like Office 365. What you can do If you were not expecting… Read More »

Privacy@Michigan to celebrate Data Privacy Day

Celebrate International Data Privacy Day with a host of faculty, staff, and student experts as they present Privacy@Michigan on Tuesday, January 30, 2–6:30 p.m., in Space 2435 of North Quad. Privacy@Michigan brings together faculty, researchers, students, and staff from different colleges, schools, and units across campus and aims to spark ongoing, multidisciplinary conversations about privacy’s role in society—here… Read More »