Tag Archives: security

New tool automates popular system security technique

By | November 18, 2020

Working with researchers from the University of Texas at Austin, Xinyu Wang, assistant professor of electrical engineering and computer science, co-authored an award-winning paper that demonstrates how to automatically build sandboxing policies to keep a computer system safe. Sandboxing is a software management strategy that isolates applications from critical system resources and other programs. One common sandbox approach… Read More »

Password tip: Use a unique password for every site and service

Here is an important password tip: Do not reuse your UMICH (Level-1) password. Try to set a unique password for each site and online service you use (or use a password manager), and never use your UMICH password for non-university accounts or services. Reusing passwords puts you at risk. There have been a number of data breaches outside… Read More »

Cybersecurity Month wrap-up by the numbers

As shown above, highlights of Cybersecurity month include: 9 virtual training sessions covering topics like privacy and data use, using Duo two-factor authentication, data classification, and more 4 virtual drop-in Q&A sessions with security analysts 1000+ people sent and received email with Virtru enhanced email security                                                                            22K+ MiWorkspace and MiServer managed systems have CrowdStrike Falcon installed for enhanced… Read More »

Improvements to the UM Emergency Alerts system

The Division of Public Safety and Security (DPSS) and Information and Technology Services (ITS) have partnered to improve the UM Emergency Alerts system for all University of Michigan campuses.  On October 19, the university introduced a new enrollment page, alerts.umich.edu, where students, faculty, and staff can go to verify or update their preferred mobile number to receive UM Emergency… Read More »

Dearborn ITS creates innovative building access screening system

As summer wound down, campus got ready for the fall semester at UM-Dearborn. An Emergency Operations Center directive necessitated restricting campus access to only those students with an on campus class—around 15% of our schedule. To do this efficiently and minimize health risks by reducing time standing in line, we turned to technology. Our reporting tool, WebFocus, produces… Read More »

A new email security tool — Virtru!

Make your U-M Gmail even more secure Information and Technology Services (ITS) is happy to announce that effective immediately, students, staff, and faculty have access to a new email security tool — Virtru. (Note: Michigan Medicine provides a similar capability for their email service). With Virtru, you can send end-to-end encrypted email to any address, prevent a forwarded email… Read More »

Good group owners make great MCommunity groups

Are you creating new MCommunity groups to help you collaborate and stay in touch with people while working or learning remotely? Group owners are responsible for ensuring that members of their group have a good experience. The MCommunity Directory includes options to help you do that. If you own a group, your responsibilities include: Having a clear purpose… Read More »

Vulnerability scans now monthly, adding internal scans

To better help you secure your unit networks, ITS Information Assurance (IA) is increasing the frequency of its universitywide scans and adding internal network scanning. As of May, universitywide vulnerability scans are now performed monthly instead of quarterly. The monthly scans will be similar to previous quarterly scans. The software begins by performing a TCP and UDP probe… Read More »

New Safe Computing resources promote remote IT security

ITS Information Assurance has rapidly developed a number of new Safe Computing resources to help you practice and promote good IT security and privacy practices in this new normal: New on Safe Computing and in IT Security at U-M. New resources covering videoconferencing security and privacy, coronavirus scams, how to prevent Zoombombing, new videos, new entries in the… Read More »

New video: Working securely from home

Check out this new IT Security Tips for When You Work from Home video from ITS Information Assurance. It covers securing your devices and connections, protecting your privacy, and watching out for phishing, scams, and fraud. Please share it with others who may find it helpful. For more details and links to resources for working securely from home,… Read More »

Reminder: Best practices for sharing safely in U-M Box and Google

When you share files or folders from Google Drive or Box, you can control the level of permissions granted to others. The U-M Collaboration Services team recommends using caution when you choose permissions for your files and folders to ensure the privacy and security of university data. This is especially true when collaborating with people outside of U-M.… Read More »

New video: Tips for safe videoconferencing

You have probably had a crash course on the basics of videoconferencing over the past few weeks. Follow the IT security and privacy best practices in this new Tips for Safe Videoconferencing video from ITS Information Assurance to make security and privacy part of your videoconferencing routine. And please share it with others who might find it helpful.… Read More »

Beware of COVID-19 coronavirus scams

Scammers are taking advantage of the fear and uncertainty surrounding the COVID-19 coronavirus. Some of the most common scams include: Fraudulent cure and treatment offers Fake charities Misinformation from scammers posing as experts Phishing Tracking maps that trick you into downloading malware See Coronavirus Scams on Safe Computing for more details. ITS Information Assurance is keeping the page… Read More »

Securely self-manage UM-owned devices

U-M faculty and staff are strongly encouraged to use computers and devices that are managed by a central U-M IT service provider, but in some circumstances, faculty and staff may need to self-manage a UM-owned device: Computers and other devices purchased with research grant funds to meet very specific research needs. Developers needing specific operating systems or software… Read More »

Not using Bluetooth or AirDrop? Turn them off!

Turn off Bluetooth and other connections when you aren’t using them, and limit access to your devices via Mac/iOS AirDrop. This helps you save your battery charge and protects you from unwanted material. Subway riders in New York City, for example, have reported receiving unsolicited nude images over open AirDrop connections. Members of the U-M community have reported… Read More »