Category Archives: Safe Computing

Visit the SafeComputing site for more information. Report a security incident. Subscribe to the Safe Computing RSS feed.

Teams practice IT security incident investigation

U-M staff members, and a number of other IT security pros from Domino’s, and Washtenaw Community College, honed their IT security investigation skills at a March 27 Boss of the SOC (Security Operations Center) event held at U-M and sponsored by the U-M Information Assurance office and Splunk. Working in teams of four to five, participants assumed the… Read More »

IA finds and fixes Shibboleth vulnerability

Imagine not being able to log in to your U-M GMail and Calendar—or Box at U-M, Canvas, and more. That might have been a risk if an attacker had exploited a previously unknown Shibboleth vulnerability. Within minutes, the attacker could have broadly disrupted logins at U-M and across higher education. Thankfully, that didn’t happen. While doing a routine… Read More »

Learn about implementing new info security standards

How do the new information security standards and the revised Information Security (SPG 601.27) policy affect your work? Information Assurance (IA) is hosting working sessions for members of the U-M community interested in learning about implementing the policy and standards. Upcoming sessions: Thursday, April 4 (1:30-3:30 p.m.). This session will cover Security Log Collection, Analysis, and Retention (DS-19)… Read More »

Encrypt your devices and data

Turn on device encryption to help secure personal and institutional data at home and at work. Encryption protects against unauthorized access to data if your device is lost or stolen. Encryption is: Required for any personal device you use to access U-M data classified as High. https://www.safecomputing.umich.edu/protect-the-u/safely-use-sensitive-data/classification-levels Recommended for any device you use to access or store U-M… Read More »

Tips for traveling safely with technology

Whether you are planning a vacation or professional trip, you will likely take along some combination of a smartphone, tablet, laptop, and other mobile devices. Follow these tips to safeguard both your own and the university’s data. Before you travel If you don’t need it, don’t travel with it. Plan which Duo options you will use and enroll… Read More »

Report: Top universities in U.S. targeted by Chinese hackers

By | March 14, 2019

U-M CIO Ravi Pendse was quoted in a recent article about how new cybersecurity intelligence suggests that Chinese hackers are ramping up their efforts to steal military research secrets from U.S. universities. According to a report in “The Wall Street Journal,” Chinese hackers targeted institutions and researchers with expertise in undersea technology as part of a coordinated cybercampaign… Read More »

IoT devices: Balance convenience with privacy & security

Internet of Things (IoT) devices, such as smart home assistants, smart appliances, and gaming systems, can collect a lot of personal data about you—sometimes more than you might realize. Personal data about you and others who use and share such devices may be retained, used, and sold in unexpected ways. IoT devices usually send data to cloud storage… Read More »

Secure your home wireless network

Be smart and secure your home network so that only those you allow can access it. This protects your privacy and networked devices. There are two basic steps to securing your home network: 1. Update all your Internet-enabled devices with the latest operating systems, web browsers, and security software. This includes any devices that access your wireless network.… Read More »

Reminder: Secure your devices if you use them for U-M work

If you use your personal devices—smartphone, laptop, tablet, and so on—for work, you are responsible for appropriately managing and securing them, as well as for meeting the obligations described in Security of Personally Owned Devices that Access or Maintain Sensitive Institutional Data (SPG 601.33). Your unit may have additional restrictions beyond those found in the SPG. Check with… Read More »

Michigan Medicine employees get new cybersecurity reminders

Starting in January, the Information Assurance Michigan Medicine Education & Awareness Program began publishing monthly IT security awareness reminders titled “Cyber Safety — Review in 2.” The campaign’s goal is to increase awareness of key cybersecurity topics by presenting important information that can be reviewed in two minutes or less. To encourage the Michigan Medicine workforce to learn more about… Read More »

Cryptocurrency mining risks and U-M restrictions

You may not use U-M resources—computers, networks, electricity—for cryptocurrency mining. Such use violates university policy and puts U-M services and data, and your personal accounts and devices, at risk. The Responsible Use of Information Resources (SPG 601.07) policy states that U-M resources may not be used “for personal commercial purposes or for personal financial or other gain.” The… Read More »