Category Archives: Safe Computing

Visit the SafeComputing site for more information. Report a security incident. Subscribe to the Safe Computing RSS feed.

How to protect your online calls from ‘Zoom-bombing’

By | October 19, 2020

The Michigan Daily recently spoke to experts on campus — including Ravi Pendse, vice president for information technology and chief information officer, and Kyle Lindsey and Hanah Stiverson, two doctoral students who are working on a book with Professor Lisa Nakamura about Zoom-bombing — to compile a list of tips to ensure calls for classes or clubs remain… Read More »

SUMIT Reimagined goes online

Security at University of Michigan IT (SUMIT) 2020, ITS’s free annual event hosted during National Cybersecurity Awareness Month, goes online for SUMIT Reimagined. This series of informational events where members of the U‑M community can get help from IT experts on a variety of topics is entirely virtual this year. Check out a few of the events below and see… Read More »

Recording classes: (Some) rules of the road

By | September 14, 2020

U-M classes are overwhelming being taught remotely this semester. This means that some instructors may, for a variety of reasons, wish to record their classes. The Safe Computing website has guidelines for instructors who plan to record class activities. Recordings where students can be identified—from in-person sessions or remote instruction via Zoom, BlueJeans, or any other videoconferencing application—are:… Read More »

Course aims to train future leader against cyber crime

By | September 11, 2020

In the course “Cybersecurity for Future Leaders” (EECS 498 / PUBPOL 475), students will gain a better understanding of the science, technology, public policy, and national security considerations behind cybersecurity in order to protect the very tenets of democracy. Election security will be one of the course’s six focus areas this fall 2020. The course is taught from… Read More »

A new email security tool — Virtru!

Make your U-M Gmail even more secure Information and Technology Services (ITS) is happy to announce that effective immediately, students, staff, and faculty have access to a new email security tool — Virtru. (Note: Michigan Medicine provides a similar capability for their email service). With Virtru, you can send end-to-end encrypted email to any address, prevent a forwarded email… Read More »

Do your part to deflect ransomware

Ransomware is on the rise and you have an important role to play in protecting U-M!!! Cybercriminals and other threat actors continue to ratchet up ransomware attacks on universities, healthcare providers, and other organizations. This summer Michigan State University and the University of California San Francisco, among others, have reported recent attacks.  Ransomware attempts often begin with a… Read More »

New UMICH password strength requirements

Next time you change or reset your UMICH (Level-1) password, you will need to meet new password strength requirements. Existing passwords are not affected by the new requirements and can remain as is. The new requirements align with current best practices and National Institute of Standards and Technology (NIST) guidelines for passwords. Given the sophistication of attempted attacks… Read More »

Duo for U-M VPN now available

You can now use Duo two-factor protection with the U-M Virtual Private Network (VPN). With faculty, staff, and students already benefiting from Duo two-factor authentication at Weblogin, ITS is working to further extend this protection to other university services. Try it now on your personal computer Visit ITS: Getting Started With VPN and choose your operating system to… Read More »

Check systems for signs of compromise

Has a system you are responsible for been compromised? How would you know? What should you do? Almost all IT professionals at some time in their career have faced these questions. Information Assurance (IA) offers guidance for checking your systems for signs of compromise, or simply suspicious activity.  Start by checking system and software logs for the following… Read More »

That text message might be a scam

You know to be wary of phishing emails and phone scams, but did you know that crooks also send text messages to steal your identity and money? These scams, called “smishing”—the word comes from SMS + phishing—appear to be increasing during the COVID-19 pandemic.  Warning signs Consider any unexpected text message from an unknown number suspect. Smishes may… Read More »

Increase in emails impersonating U-M deans and other employees

ITS Information Assurance is seeing an increase in fraudulent emails that appear to come from U-M deans, employees and offices. These fraudulent emails use a practice known as “spoofing.” Different versions of these emails ask the recipient to: Quickly arrange for gift cards to cover a university expense Reply if you are available Make an immediate wire transfer… Read More »

Good group owners make great MCommunity groups

Are you creating new MCommunity groups to help you collaborate and stay in touch with people while working or learning remotely? Group owners are responsible for ensuring that members of their group have a good experience. The MCommunity Directory includes options to help you do that. If you own a group, your responsibilities include: Having a clear purpose… Read More »

Write emails that don’t look phishy

Given the current infodemic related to the COVID-19 pandemic, it is harder than ever to get your important university information through to the people who need it. People are rightfully suspicious of unsolicited email, but that can sometimes cause them to ignore or delete your important, legitimate communications. Focus on helping recipients verify the legitimacy of your U-M… Read More »

Vulnerability scans now monthly, adding internal scans

To better help you secure your unit networks, ITS Information Assurance (IA) is increasing the frequency of its universitywide scans and adding internal network scanning. As of May, universitywide vulnerability scans are now performed monthly instead of quarterly. The monthly scans will be similar to previous quarterly scans. The software begins by performing a TCP and UDP probe… Read More »

Why we adopt then abandon online safety practices

By | April 28, 2020

To find out why people adopt and then sometimes abandon online safety measures, researchers from the School of Information surveyed more than 900 people about their use of 30 commonly recommended practices to guard against security, privacy, and identity theft risks. The team found that security practices like avoiding clicking on unknown links or emails were much more… Read More »