Worried a system was compromised? Understanding what to look for and when to call for help can give you peace of mind and protect university and personal data.
If you manage U-M or unit systems, computers, or data, you are responsible for taking steps to protect them from ransomware. If you use U-M computing services, you are responsible for learning not to respond to phishing emails, which often provide entry to ransomware.
Coming in fall 2021, it is anticipated that use of Duo two-factor will be required when logging in to the U-M Virtual Private Network (VPN). That will provide added security not just for you, but for U-M networks and systems, too.
Secure and encrypt your devices to protect U-M and your personal data.
Have you ever seen a pop-up on your computer or received an unsolicited call urging you to contact “tech support?” Scammers sometimes impersonate IT support staff and claim something is wrong with your computer. They offer to help fix the problem—for a fee—but instead may steal your personal information or infect your computer with malicious software. This can… Read More »
Ransomware, phishing, and cyberattacks are on the rise and, increasingly, they target higher education. The most effective way to defend against them is to work together.
As U-M employees and community members, we all share in the responsibility to help protect U-M IT systems and data. But how do you do that? ITS Information Assurance has developed a Safe Computing Curriculum that offers IT security and privacy/confidentiality best practices to help safeguard the university’s digital assets.
IT security is a shared responsibility and we all need to do our part. Check out this new video to learn about your shared responsibility to protect U-M computing resources and data: IT Security—Our Shared Responsibility (2:07) As part of the U-M community, you’re provided with access to a wide variety of computing resources—and sometimes to very sensitive… Read More »
To help the Michigan Medicine community protect organizational and personal data, a new Cyber Safety Best Practices series was added to MLearning.
IT security is a shared responsibility and a never-ending journey of incremental improvement, but some improvements are larger and come faster than others. In October 2020, ITS announced that Enhanced Endpoint Protection powered by CrowdStrike Falcon would be rolled out to university-owned computers (desktops, laptops, and servers). About six months later, as of early March 2021, Falcon has… Read More »
Students, faculty, and staff are invited to attend office hours with ITS Information Assurance experts. Come ask your IT security and privacy questions!
Following these guidelines to secure personal devices that you use for working with U-M data protects you and the university.
Stay up to date on IT security and privacy stories with Safe Computing’s In the Media section.
It’s important to remember to restart your web browser so that updates can be applied, and your browsing can be as secure as possible.
Technology-packed autonomous vehicles will create a new frontier for hackers. A UM-Dearborn cybersecurity expert explains how we might protect them.
The public perception of the SSN has gone from a symbol of security to be seen as a symbol of privacy insecurity.
U-M’s Economic Growth Institute will use a grant from the U.S. Department of Commerce to boost cybersecurity know-how among small manufacturers in southeastern Michigan.
There’s a good chance that your life will at some point depend on a piece of computer software. Lines of code drive pacemakers, insulin pumps, hospital imaging machines and just about every other electronic medical device that’s manufactured today. But where there’s software, there are hackers. And a steady stream of hospital ransomware attacks and other malicious activities… Read More »
Enhanced Endpoint Protection powered by CrowdStrike (Falcon) is a critical part of securing and protecting U-M systems and data, and we are relying on you all to complete deployment by the end of February.
When working from home or elsewhere, you can use Duo two-factor protection for additional security with the U-M Virtual Private Network (VPN). It provides added security not just for you, but for U-M networks, too.