Category Archives: Safe Computing

Visit the SafeComputing site for more information. Report a security incident. Subscribe to the Safe Computing RSS feed.

How to create better privacy policies

By | October 13, 2017

A 2008 study estimated that it would take 244 hours a year for the typical American internet user to read the privacy policies of all websites he or she visits—and that was before smartphones with dozens of apps, cloud services, and smart home technologies. If you’re like most people, you don’t read them. Florian Schaub, assistant professor of information at… Read More »

Michigan Medicine IT security projects

IT security is an ongoing priority for Michigan Medicine. Currently, several projects are focused on enhancements and upgrades to ensure the security of patient and personal data and services. Find out more about the following: Enterprise Identity and Access Management (EIAM) Program Network Admission Control (NAC) for the Wireless and Wired Networks Skype for Business mobile – Secure… Read More »

October is National Cyber Security Awareness Month

With massive data breaches like the one at Equifax (what to do if you are affected) constantly in the news, it sometimes feels as if we are under siege and helpless to defend ourselves. Yet we now have more power than ever before to control digital identity and important financial and other sensitive accounts. Take some time this… Read More »

Protection from malicious websites on UM-Ann Arbor networks

Beginning October 17, safeguards will be put in place that help protect the U-M community from websites known to be malicious—those that attempt to steal your personal information or infect your device with malware—on most UM-Ann Arbor wired networks. This protection is already included on MWireless and MGuest. Domain Name Service (DNS) filtering checks websites against a list… Read More »

Remember Duo Remember Me?

When students, staff, and faculty come to you with concerns about the latest virus, hack, or phishing attempt, pass on the good news that turning on two-factor to protect their U-M Weblogin and personal data is even easier. In April, the university added the Remember Me option to two-factor for services accessed via the Weblogin page. It allows you… Read More »

Look before you log in

By | August 14, 2017

Many people at U-M receive phishing emails with links to fake Weblogin pages that look exactly like the real one. When people log in to the fake page, their password is stolen, and their U-M account is compromised. The only clue it’s a fraudulent login page is the URL. Before entering your UMICH (Level 1) password, check that… Read More »

MiWorkspace partners with HITS to meet increased network security standards

The MiWorkspace team at Information and Technology Services (ITS) worked with Health Information Technology & Services (HITS) to configure MiWorkspace computers to connect to the Michigan Medicine wired network. Michigan Medicine is increasing security for their wired networks by requiring trusted university devices contain a specific security protocol. MiWorkspace computers in the following units are now configured to… Read More »

Teams respond swiftly to malware attack on vendor

By | July 31, 2017

When Michigan Medicine’s telephone dictation and transcription service provider was impacted by a global malware cyberattack, teams from Health Information Technology & Services (HITS) and Health Information Management (HIM) acted swiftly to ensure the service was disabled, no patient information was compromised, and alternative solutions were provided. “Many staff played a role in the response to the dictation… Read More »

New U-M policy makes software purchases easier

By | July 7, 2017

If you purchase software for university use, please be aware of Software Procurement and Licensing Compliance (SPG 601.03-03). This new policy, which took effect April 10, 2017, was developed by Procurement Services with input from Information Assurance, Office of the General Counsel, and others. Under the new policy, university PCards or purchase orders can be used to purchase… Read More »

Wireless network update a success – what’s next?

In April, the Michigan Medicine community came together to achieve a significant goal – namely to ensure that enhanced security protocols were in place on all wireless devices connecting to the mission critical network. WiFi security for more than 20,000 devices joining the network daily was the first step in a 19-month initiative to make the IT environment… Read More »

U-M not affected by worldwide ransomware attacks

U-M has not been affected by the widespread global ransomware attacks on computer networks over the weekend. Even with the U-M campuses — including Michigan Medicine — unaffected at this time, the attack remains a serious, ongoing threat. The attack that started May 12 has spread to more than 150 countries and 200,000 computers. For those affected, the attack… Read More »

Private MCommunity groups now hide owners, moderators

By | May 15, 2017

Private groups in the MCommunity Directory now hide not only the members, but also the owners and moderators. Aside from enhancing overall MCommunity privacy, this feature, which was implemented May 13, will help make the kind of email spoofing that occurred earlier this year more difficult. It stops would-be email spoofers from discovering and impersonating the moderator of… Read More »

Smartphone security hole

By | May 3, 2017

A sweeping study by U-M researchers of an internet communication mechanism common in mobile devices has revealed that so-called ‘open ports’ are much more vulnerable to security breaches than previously thought. The vulnerability is most pronounced in Android apps that let users share data across devices and connect to their phones from their computers. One app, called Wifi… Read More »

‘Dissonance’ speakers discuss conflict & cyberspace

By | April 26, 2017

On April 13, a panel of experts discussed the development of international cyberspace norms. The event was part of the Dissonance, an ongoing speaker series that explores timely topics at the confluence of technology, law, privacy, and security. Watch the recording Event highlights Discussion points included what constitutes responsible state behavior in cyberspace, the differences between physical attacks and cyberattacks,… Read More »