Matt Ranville, Information Assurance

You can contact Matt at mrr@umich.edu.

Transfer files before leaving U-M or changing jobs

If you are changing jobs, retiring, or leaving U-M, move any files needed for university business somewhere that your colleagues can access and set appropriate permissions. This includes files on your computer; files in Google at U-M, Dropbox at U-M, and other online storage; and MCommunity groups. Use shared storage space when you can It is best to… Read More »

Six Words About Privacy in EDUCAUSE Review

Svetla Sytch, assistant director of privacy and IT policy, described some of ITS Information Assurance’s privacy engagement efforts in a January 28 EDUCAUSE Review blog post: Data Privacy Day 2021 Outreach: Six Words about Privacy. In the blog post, Sytch explained that Six Words About Privacy at U-M came about through conversations with the chief information security officers… Read More »

New IoT devices for the holidays? Mind your privacy & security!

Internet of things (IoT) devices can be great gifts, but those smart home speakers, thermostats, and cool wearables like watches and fitness trackers come with some security and privacy risks. To protect yourself and your personal data, follow these tips: Privacy Mute your smart speaker when not using it. Disable features you don’t use. Choose privacy settings for… Read More »

Shop online safely

As the holidays approach and the pandemic continues, you are highly likely to be doing more online shopping. Protect yourself from scams and data theft with these tips from ITS Information Assurance. Shop with trustworthy sites and sellers. Stick to businesses you know and trust, and compare descriptions and prices from multiple sellers to help spot scams. Be… Read More »

Check systems for signs of compromise

Has a system you are responsible for been compromised? How would you know? What should you do? Almost all IT professionals at some time in their career have faced these questions. Information Assurance (IA) offers guidance for checking your systems for signs of compromise, or simply suspicious activity.  Start by checking system and software logs for the following… Read More »

Good group owners make great MCommunity groups

Are you creating new MCommunity groups to help you collaborate and stay in touch with people while working or learning remotely? Group owners are responsible for ensuring that members of their group have a good experience. The MCommunity Directory includes options to help you do that. If you own a group, your responsibilities include: Having a clear purpose… Read More »

Beware of COVID-19 coronavirus scams

Scammers are taking advantage of the fear and uncertainty surrounding the COVID-19 coronavirus. Some of the most common scams include: Fraudulent cure and treatment offers Fake charities Misinformation from scammers posing as experts Phishing Tracking maps that trick you into downloading malware See Coronavirus Scams on Safe Computing for more details. ITS Information Assurance is keeping the page… Read More »

New video: How to report IT security incidents

It is vital that you report actual or suspected IT security incidents as soon as possible so that work can begin to investigate and resolve them. This applies even when you are working from home. A new ITS Information Assurance (IA) video tells you where to report them (security@umich.edu), and describes how IA responds. For more detail about… Read More »

Work securely while working remotely 

Across the world, working from home has become a necessity. When you are working from home, follow IT security best practices to protect yourself and U-M: Secure your computer, smartphone, and other devices. Secure your connections to protect data you send and receive. Beware of phishing, scams, fraud, and other tricks and traps. Protect sensitive U-M data by… Read More »

Securely self-manage UM-owned devices

U-M faculty and staff are strongly encouraged to use computers and devices that are managed by a central U-M IT service provider, but in some circumstances, faculty and staff may need to self-manage a UM-owned device: Computers and other devices purchased with research grant funds to meet very specific research needs. Developers needing specific operating systems or software… Read More »