Category Archives: Safe Computing

Visit the SafeComputing site for more information. Report a security incident. Subscribe to the Safe Computing RSS feed.

New tools for SULs and Unit Security Partners

Information Assurance (IA) is committed to continually improving and streamlining capabilities, tools, and resources that support all of our shared responsibility to protect U-M systems and data. To this end, we are announcing changes to some key IA tools that will improve our unit partners’ ability to analyze and reduce security threats and risks for their units. New… Read More »

TikTok, Boom.: Watch the panel discussion, event recap

The U-M Dissonance Event Series explores issues at the intersection of technology, policy, privacy, security, and law, and seeks to increase university-wide, multidisciplinary discourse. ITS Information Assurance and Dissonance hosted a panel discussion of Shalini Kantayya’s film Coded Bias in 2021. The filmmaker’s latest documentary, TikTok, Boom., told another complex story that spurred a thoughtful and engaging conversation… Read More »

Save the date: TikTok, Boom. Watch event and discussion

ITS Information Assurance is excited to announce the latest from the Dissonance Event Series. You are invited to a free, on-demand screening of the documentary film TikTok, Boom. and a conversation with the filmmaker Shalini Kantayya. March 6 through March 15 – Virtual screening of TikTok, Boom.Join us for a virtual screening of TikTok, Boom. The film examines… Read More »

Rooting for Black women in cybersecurity

With Black History Month winding down and International Women’s Day around the corner, ITS Information Assurance (IA) celebrates Black women in cybersecurity.  In the face of racist institutional policies and segregation laws in 1940s and 1950s America, Black women, such as Annie Briggs, Ethel Just, and the Black “code girls” of Arlington Hall, blazed trails in a field… Read More »

Learn how to protect yourself against online harassment

Having a presence on the internet in any form means there’s a real possibility you’ve faced online harassment or witnessed someone become a victim of it. A Pew Research Center survey found that 41% of Americans have experienced some form of this type of harassment, which is defined as the “pervasive or severe targeting of an individual or… Read More »

Tenable.io vulnerability management software is now available

As headlines and research reports reveal, cyber threats are steadily increasing across all sectors, including higher education institutions. Higher ed’s decentralized, more open IT environments create higher risks, and allow for cyberattacks that can cause entire institutions to shutdown. At U-M, we take a layered approach to IT security. In addition to network protections, and advanced endpoint protection… Read More »

Putting the spotlight on web privacy

At the University of Michigan, we have a commitment to respecting and protecting the privacy of our community members and guests. In the summer of 2022, the U-M Privacy Office decided to put that commitment to the test on U-M websites. ITS Information Assurance (IA) used the real-time website privacy inspection tool Blacklight to scan the top 50… Read More »

Enhancements to MCommunity Group expiration and renewal

On December 8, an MCommunity release improved deactivated and expired group functionality. Instead of deleting groups as they do today, owners now deactivate groups, thus affording all owners an option to restore groups. My Groups in MCommunity now includes a new Trash tab showing group owners all their deactivated and expired groups.  Owners can recover groups for 30… Read More »

SUMIT Keynote: Adventures in Securing At-Risk People

The capstone of the 17th Security at University of Michigan IT (SUMIT) event series was a thought-provoking presentation and conversation on digital protection of the press and at-risk individuals. In Adventures in Securing At-Risk People, Runa Sandvik and Elodie Vialle talked about their passion for helping journalists do their work securely.  Runa Sandvik, founder of Granitt, has been… Read More »

Using social media to reach diverse audiences

One of ITS Information Assurance’s core responsibilities is to provide guidance to the entire university community on IT security and privacy compliance best practices and help individuals protect university systems and data, as well as their own personal information. IA is always on the lookout for innovative and compelling ways to engage our students, faculty, and staff, such… Read More »

ITS IA engages students with Cybersecurity Challenge

This year marked the 20th year that ITS Information Assurance (IA) has invited U-M students to take an online quiz to raise awareness about IT security issues and promote security and privacy best practices during October’s National Cybersecurity Awareness Month.  All U-M students on the UM-Ann Arbor (including medical students), UM-Dearborn, and UM-Flint campuses who scored 90% or… Read More »

SUMIT 2022: Safe Computing for Everyone

As part of this fall’s SUMIT series of weekly events, the Education and Engagement team of ITS Information Assurance (IA) presented on how they curate knowledge, develop training, and create awareness for U-M community members to protect themselves and the U. The team of Performance Support Analysts featured “Jen and the Matts” (Jen Wilkerson, Matt Ranville, and Matt… Read More »

Are you ready for Cybersecurity Awareness Month?

This fall, ITS Information Assurance (IA) continues the tradition of celebrating Cybersecurity Awareness Month with the annual SUMIT series of weekly events hosted by IA’s cybersecurity experts. SUMIT’s online sessions include: Cosign Retirement Drop-in Sessions: Unit IT who manage services that use Cosign authentication can learn how to smoothly transition from Cosign to Shibboleth (SAML or OIDC). Safe… Read More »

Remediation of insecure remote access protocols

Remote access protocols allow a computer to talk to remote systems. They allow system administrators to remotely configure, maintain, and manage systems, and provide individuals access to essential applications and data. Since the start of the COVID-19 pandemic, these protocols have provided needed convenience to users and system administrators who depend on off-site connectivity to campus resources.  However,… Read More »