Tag Archives: security

Keep your personal software up-to-date

We all should be in the habit of keeping our software up-to-date. This is necessary because vendors and others regularly identify security vulnerabilities in software and apps, and then release updates and patches to fix them. Additionally, keeping your software current enables you to take advantage of other improvements, such as better performance or new functionality. Personal computers… Read More »

Turn on two-factor for your personal accounts

Many popular services and websites offer two-factor authentication. Information Assurance (IA) encourages you to turn it on whenever it’s available to protect your personal accounts. Duo may be an option If you already use the Duo Mobile app for two-factor at U-M, you might be able to use it with your personal, non-university accounts. If a service’s instructions… Read More »

Use antivirus software to protect U-M and personal computers

Antivirus software should be installed and kept up-to-date on all of your computers—both your own and those owned by the university. MiWorkspace computers already have antivirus software installed, and it is updated automatically. For U-M computers Information Assurance (IA) recommends these antivirus products that are licensed for use on UM-owned computers: Windows 8 and 10. Use Windows Defender,… Read More »

Register today to attend SUMIT October 25

Mark your calendars for SUMIT_2018, U-M’s 14th annual cyber security conference on Thursday, October 25. Learn more and register today! Security at University of Michigan IT (SUMIT) is the university’s flagship event for National Cybersecurity Awareness Month. Held at Rackham Auditorium, SUMIT is an exciting opportunity to hear recognized experts discuss the latest issues, trends, and threats in… Read More »

Intel processor vulnerability could put millions of PCs at risk

By | August 17, 2018

 Researchers at U-M were part of a group that discovered a new processor vulnerability that could potentially put secure information at risk in any Intel-based PC manufactured since 2008. It could affect users who rely on a digital lockbox feature known as Intel Software Guard Extensions, or SGX, as well as those who utilize common cloud-based services,… Read More »

Chrome extension warns you of malicious websites

You know you need to check the URL before logging in, but wouldn’t it be great if your web browser did some of that checking for you? If you use Chrome and an extension from Information Assurance (IA), it can. The U-M Safe Computing Website Checker extension for Chrome warns you while you are using Chrome: When you… Read More »

Duo mandatory at Michigan Medicine beginning October 10

Phishing attacks, data breaches, and identity theft have become common issues plaguing organizations the world over, including health systems and universities. The most significant step the Michigan Medicine community can take to protect their data, as well as that of our patients and research participants, is to use Duo with all web-based services that require U-M login. While 26,000… Read More »

HITS implements 30-day network policy

The institutionally owned devices we use to do our work are kept secure by connecting regularly to the internal U-M network. Connecting ensures that our devices receive the patches and anti-virus protection that are typically installed automatically and daily whenever we are logged in. Effective August 16, 2018, Health Information Technology & Services (HITS) will implement a policy… Read More »

Shared threat intelligence saves the day

A Distributed Denial of Service (DDoS) attack took down a residence hall network switch at the University of Maryland (UMD) over spring break 2018, but it could have been a lot worse without the collaborative threat information sharing partnership of U-M and other universities. 90% of attack traffic blocked “If we hadn’t been using our shared threat intelligence,… Read More »

Tips for writing emails that don’t look phishy

You have an important university email to send, but how do you craft it so it looks like the official, trustworthy, communication it is? In other words, how do you keep people from thinking it is a phish? Email users are rightfully suspicious of unsolicited email, but that can sometimes cause them to ignore or delete your important,… Read More »

Export Controls CoP expands to address CUI

A new Community of Practice (CoP) group has been established to address the challenges U-M programs, faculty, students, and employees may face with the federal government’s Controlled Unclassified Information (CUI) program. The new U-M CUI CoP has evolved from the Export Controls CoP, which now falls under the umbrella of the CUI CoP. U-M, like all research universities,… Read More »

Beware of tech support scams

 Have you ever seen a pop-up on your computer or received an unsolicited call urging you to contact “tech support?” Scammers sometimes impersonate IT support staff and claim something is wrong with your computer. They offer to help fix the problem—for a fee—but instead may steal your personal information or infect your computer with malicious software. This… Read More »

Say no to cryptocurrency mining

Cryptocurrency mining is best avoided. Don’t do it yourself, and don’t let attackers use your devices to do it. Cryptocurrency mining is a computationally intensive process of validating digital currency transactions that allows the miner to earn transaction fees and digital currency. Illicit cryptocurrency mining has displaced ransomware as the number one cyber security threat, according to industry… Read More »

Transfer file ownership before people leave

When U-M employees leave the university or transfer from one unit to another, it is important to consider transferring ownership of files and other digital resources needed for university business. See these resources for tips and information: Leaving U-M U-M Termination Checklist (downloadable Excel file from U-M Human Resources) What to do if something is missed In cases… Read More »

Tips for secure passwords

In honor of World Password Day on May 3, School of Information assistant professor Florian Schaub shared these online security tips: Use a password manager Use unique passwords Use two-factor authentication (like Duo!) Whether it’s World Password Day or not, it’s a good idea to update online privacy settings. Watch the video below to learn how. For additional… Read More »

Google Chrome verification begins May 7

Beginning Monday, May 7, Google is rolling out a new security feature that requires users to verify their identity when using the Chrome browser to log in to Google at U-M. The information below explains what to expect with the new Google Chrome verification process. When you log in to your Google at U-M account using the Chrome… Read More »

Tips for traveling safely with technology

Whether you are planning a vacation or professional trip, you will likely take along a smartphone, tablet, laptop, or other mobile device. Follow these tips to safeguard both your own and the university’s data. Before you travel Consider taking a device you only use for travel. Securely back up data stored on your device(s) or media. Prepare for… Read More »

Vulnerability management & vendor compliance standards published

Two new standards clearly define responsibilities regarding vulnerability management and vendor security and compliance, and updated and expanded guidance to help you meet those responsibilities is on Safe Computing. Andrew Rosenberg, interim U-M vice president for information technology and Michigan Medicine chief information officer, recently approved these two new standards: Third Party Vendor Security and Compliance (DS-20). When… Read More »