Category Archives: Safe Computing

Visit the SafeComputing site for more information. Report a security incident. Subscribe to the Safe Computing RSS feed.

Tips for traveling safely with technology

Whether you are planning a vacation or professional trip, you will likely take along some combination of a smartphone, tablet, laptop, and other mobile devices. Follow these tips to safeguard both your own and the university’s data. Before you travel If you don’t need it, don’t travel with it. Plan which Duo options you will use and enroll… Read More »

Report: Top universities in U.S. targeted by Chinese hackers

By | March 14, 2019

U-M CIO Ravi Pendse was quoted in a recent article about how new cybersecurity intelligence suggests that Chinese hackers are ramping up their efforts to steal military research secrets from U.S. universities. According to a report in “The Wall Street Journal,” Chinese hackers targeted institutions and researchers with expertise in undersea technology as part of a coordinated cybercampaign… Read More »

IoT devices: Balance convenience with privacy & security

Internet of Things (IoT) devices, such as smart home assistants, smart appliances, and gaming systems, can collect a lot of personal data about you—sometimes more than you might realize. Personal data about you and others who use and share such devices may be retained, used, and sold in unexpected ways. IoT devices usually send data to cloud storage… Read More »

Secure your home wireless network

Be smart and secure your home network so that only those you allow can access it. This protects your privacy and networked devices. There are two basic steps to securing your home network: 1. Update all your Internet-enabled devices with the latest operating systems, web browsers, and security software. This includes any devices that access your wireless network.… Read More »

Reminder: Secure your devices if you use them for U-M work

If you use your personal devices—smartphone, laptop, tablet, and so on—for work, you are responsible for appropriately managing and securing them, as well as for meeting the obligations described in Security of Personally Owned Devices that Access or Maintain Sensitive Institutional Data (SPG 601.33). Your unit may have additional restrictions beyond those found in the SPG. Check with… Read More »

Michigan Medicine employees get new cybersecurity reminders

Starting in January, the Information Assurance Michigan Medicine Education & Awareness Program began publishing monthly IT security awareness reminders titled “Cyber Safety — Review in 2.” The campaign’s goal is to increase awareness of key cybersecurity topics by presenting important information that can be reviewed in two minutes or less. To encourage the Michigan Medicine workforce to learn more about… Read More »

Cryptocurrency mining risks and U-M restrictions

You may not use U-M resources—computers, networks, electricity—for cryptocurrency mining. Such use violates university policy and puts U-M services and data, and your personal accounts and devices, at risk. The Responsible Use of Information Resources (SPG 601.07) policy states that U-M resources may not be used “for personal commercial purposes or for personal financial or other gain.” The… Read More »

Protecting medical devices from cybersecurity threats

Medical devices capable of transmitting health information and connecting to Michigan Medicine’s networks offer improvements to the effective delivery of patient care, but they also may introduce privacy and security concerns. Michigan Medicine’s Information Assurance (IA) program has been raising awareness of these concerns and developing new approaches to address these vulnerabilities. As a major step, Michigan Medicine… Read More »

IA Chrome extension protecting LSA

About 2,100 managed systems in the College of Literature, Science, and the Arts (LSA) now have extra protection from malicious websites thanks to the Safe Computing Website Checker developed by Information Assurance (IA). The extension protects people from some types of malicious websites when browsing the web with Chrome. “Utilizing Group Policy Management (GPO) we have deployed this… Read More »

Only store sensitive data in approved services—check the guide!

Do you work with sensitive data? Any time you are thinking about using a storage or collaboration service for sensitive university data—whether in the cloud or at U-M: Check the Sensitive Data Guide first to see which services are approved for your data type. If the service you want to use is not listed in the guide, ask… Read More »