Author Archives: Matt Ranville, Information Assurance
Transfer files before leaving U-M or changing jobs
If you are changing jobs, retiring, or leaving U-M, move any files needed for university business somewhere that your colleagues can access and set appropriate permissions. This includes files on your computer; files in Google at U-M, Dropbox at U-M, and other online storage; and MCommunity groups. Use shared storage space when you can It is best to… Read More »
Ask the ITS IA Experts
Manage MCommunity groups used for U-M business
Secure personal devices used with U-M data
Check Safe Computing’s “In the Media” for IT security and privacy news
Restart your web browser for security updates
Practice and encourage good digital citizenship
Six Words About Privacy in EDUCAUSE Review
Svetla Sytch, assistant director of privacy and IT policy, described some of ITS Information Assurance’s privacy engagement efforts in a January 28 EDUCAUSE Review blog post: Data Privacy Day 2021 Outreach: Six Words about Privacy. In the blog post, Sytch explained that Six Words About Privacy at U-M came about through conversations with the chief information security officers… Read More »
Securely dispose of your old tech
If you are adding or upgrading to new tech devices, you might have old ones that you, or U-M unit, are ready to dispose of. Old disks, flash drives, smartphones, and computers can all contain personal data, and in some cases, U-M data if you used those devices for work. Keep that data from falling into the wrong… Read More »
New IoT devices for the holidays? Mind your privacy & security!
Internet of things (IoT) devices can be great gifts, but those smart home speakers, thermostats, and cool wearables like watches and fitness trackers come with some security and privacy risks. To protect yourself and your personal data, follow these tips: Privacy Mute your smart speaker when not using it. Disable features you don’t use. Choose privacy settings for… Read More »
Shop online safely
As the holidays approach and the pandemic continues, you are highly likely to be doing more online shopping. Protect yourself from scams and data theft with these tips from ITS Information Assurance. Shop with trustworthy sites and sellers. Stick to businesses you know and trust, and compare descriptions and prices from multiple sellers to help spot scams. Be… Read More »
Check systems for signs of compromise
Has a system you are responsible for been compromised? How would you know? What should you do? Almost all IT professionals at some time in their career have faced these questions. Information Assurance (IA) offers guidance for checking your systems for signs of compromise, or simply suspicious activity. Start by checking system and software logs for the following… Read More »
Secure your devices
If you are working from home, you may be using some of your personal devices to take care of U-M business. Make sure they are appropriately secured to protect yourself and U-M. If you access or maintain sensitive university data with your devices, you are responsible for securing them. See: Security of Personally Owned Devices That Access or… Read More »
Good group owners make great MCommunity groups
Are you creating new MCommunity groups to help you collaborate and stay in touch with people while working or learning remotely? Group owners are responsible for ensuring that members of their group have a good experience. The MCommunity Directory includes options to help you do that. If you own a group, your responsibilities include: Having a clear purpose… Read More »
Beware of COVID-19 coronavirus scams
Scammers are taking advantage of the fear and uncertainty surrounding the COVID-19 coronavirus. Some of the most common scams include: Fraudulent cure and treatment offers Fake charities Misinformation from scammers posing as experts Phishing Tracking maps that trick you into downloading malware See Coronavirus Scams on Safe Computing for more details. ITS Information Assurance is keeping the page… Read More »
New video: How to report IT security incidents
It is vital that you report actual or suspected IT security incidents as soon as possible so that work can begin to investigate and resolve them. This applies even when you are working from home. A new ITS Information Assurance (IA) video tells you where to report them (security@umich.edu), and describes how IA responds. For more detail about… Read More »
Work securely while working remotely
Across the world, working from home has become a necessity. When you are working from home, follow IT security best practices to protect yourself and U-M: Secure your computer, smartphone, and other devices. Secure your connections to protect data you send and receive. Beware of phishing, scams, fraud, and other tricks and traps. Protect sensitive U-M data by… Read More »
Securely self-manage UM-owned devices
U-M faculty and staff are strongly encouraged to use computers and devices that are managed by a central U-M IT service provider, but in some circumstances, faculty and staff may need to self-manage a UM-owned device: Computers and other devices purchased with research grant funds to meet very specific research needs. Developers needing specific operating systems or software… Read More »
Practice and encourage good digital citizenship
Do your part to support online civility and practice and promote good digital citizenship. Be responsible and respectful in self expression, and expect respect from those you interact with. Help care for digital resources by encouraging good security practices. Respect others’ privacy, and take steps to protect your own privacy by staying aware of what you share online.… Read More »