Matt Ranville, Information Assurance

You can contact Matt at mrr@umich.edu.

March 18: “What Does Big Tech Owe Us?”

Wallace House presents Recode’s Kara Swisher interviewing Alex Stamos live on stage at U-M’s Hill Auditorium, March 18, at 6:30 p.m. This event is co-sponsored by ITS, the Dissonance Event Series, and others. Huge tech companies have changed the way we live. Google, Amazon, Facebook, and Apple have built unprecedented reach into our pocketbooks, privacy, individual liberties, and… Read More »

Attend “What Does Big Tech Owe Us?” March 18

Wallace House presents Recode’s Kara Swisher interviewing Alex Stamos live on stage at U-M’s Hill Auditorium, March 18, at 6:30 p.m. This event is co-sponsored by ITS, the Dissonance Event Series, and others. Huge tech companies have changed the way we live. Google, Amazon, Facebook, and Apple have built unprecedented reach into our pocketbooks, privacy, individual liberties, and… Read More »

WINS services will be decommissioned on Feb. 8, 2020

On February 8, ITS Identity and Access Management (IAM) will disable the ITS Windows Internet Name Service (WINS). If you have Samba file servers that are more than about 10 years old, you may want to verify your configurations. WINS is a now-deprecated predecessor to Domain Name Service (DNS) and was necessary for Windows NT, Windows 98, and… Read More »

New IoT devices for the holidays? Mind your privacy & security!

Are you getting or giving new Internet of Things (IoT) devices—things like smart home assistants, smart appliances, gaming systems, and wearable watches and trackers—this holiday season? If so, follow and share these basic privacy and security precautions: Change the default password for the device. Set a unique password for each device. Disable features you don’t use. Change default… Read More »

U-M and OSU find common ground…off the football field

While the famous football rivalry gets all the press, it’s easy to forget that U-M and Ohio State University are partners in a variety of ways off the field. The two schools are partnering in identity and access management (IAM) to identify short-term problems to solve together, and to develop shared future IAM approaches and solutions. “In today’s… Read More »

Participate in National Cybersecurity Awareness Month this October!

Every October, ITS Information Assurance (IA) leads a U-M celebration of National Cybersecurity Awareness Month (NCSAM) by hosting events, sharing tips, and reminding everyone of our shared responsibility to protect and secure university and personal systems and the sensitive information they contain. NCSAM is spearheaded by the National Cyber Security Alliance and the U.S. Department of Homeland Security.… Read More »

Review your MCommunity privacy settings

Your profile Your MCommunity profile shows only information related to your U-M affiliation. For U-M staff members, publicly viewable information includes: name, uniqname, email address, U-M affiliation, title, and U-M work phone number and address. You can choose privacy settings for additional information about yourself, such as your notice or description. You can choose whether the additional information… Read More »

Transfer file ownership before people leave the university

When U-M employees leave the university or transfer from one unit to another, it is important to transfer ownership of files, MCommunity groups, and other digital resources needed for university business. See these resources for tips and information: Leaving U-M U-M Termination Checklist (downloadable Excel file from U-M Human Resources) Plan ahead to avoid disruptions and protect privacy… Read More »

Encrypt your devices and data

Turn on device encryption to help secure personal and institutional data at home and at work. Encryption protects against unauthorized access to data if your device is lost or stolen. Encryption is: Required for any personal device you use to access U-M data classified as High. https://www.safecomputing.umich.edu/protect-the-u/safely-use-sensitive-data/classification-levels Recommended for any device you use to access or store U-M… Read More »

IoT devices: Balance convenience with privacy & security

Internet of Things (IoT) devices, such as smart home assistants, smart appliances, and gaming systems, can collect a lot of personal data about you—sometimes more than you might realize. Personal data about you and others who use and share such devices may be retained, used, and sold in unexpected ways. IoT devices usually send data to cloud storage… Read More »

Cryptocurrency mining risks and U-M restrictions

You may not use U-M resources—computers, networks, electricity—for cryptocurrency mining. Such use violates university policy and puts U-M services and data, and your personal accounts and devices, at risk. The Responsible Use of Information Resources (SPG 601.07) policy states that U-M resources may not be used “for personal commercial purposes or for personal financial or other gain.” The… Read More »

Participate in National Cybersecurity Awareness Month this October!

Every October, Information Assurance (IA) leads a celebration of National Cybersecurity Awareness Month (NCSAM) by hosting events, sharing tips, and reminding everyone of our shared responsibility to protect and secure university and personal systems and the sensitive information they contain. NCSAM is spearheaded by the National Cyber Security Alliance and the U.S. Department of Homeland Security. This year,… Read More »

Use antivirus software to protect U-M and personal computers

Antivirus software should be installed and kept up-to-date on all of your computers—both your own and those owned by the university. MiWorkspace computers already have antivirus software installed, and it is updated automatically. For U-M computers Information Assurance (IA) recommends these antivirus products that are licensed for use on UM-owned computers: Windows 8 and 10. Use Windows Defender,… Read More »

Transfer file ownership before people leave

When U-M employees leave the university or transfer from one unit to another, it is important to consider transferring ownership of files and other digital resources needed for university business. See these resources for tips and information: Leaving U-M U-M Termination Checklist (downloadable Excel file from U-M Human Resources) What to do if something is missed In cases… Read More »

MS Office doc dangers: Macros & enabled content pose risks

Macros are small bits of programming used in Microsoft Office docs to automate tasks. Unfortunately, they can also spread viruses and malware, and anti-virus programs cannot always catch them. Infected Office docs are typically spread through email attachments or download links, or even through cloud services like Office 365. What you can do If you were not expecting… Read More »