Tag Archives: security
Don’t reuse your UMICH password
You put U-M systems and data at risk if you use your UMICH (Level-1) password for non-university services. If you use your UMICH email address and password to establish a personal account, and that information is exposed in a data breach, your UMICH account is at risk. If you have used your UMICH (Level-1) password for non-university services,… Read More »
Role & access management: The future of easier, more secure access to U-M resources
Halderman testifies in Senate’s Russia probe
J. Alex Halderman (second from right), professor of electrical engineering and computer science, testified before the U.S. Senate Select Committee on Intelligence at a June 21 hearing titled “Russian Interference in the 2016 U.S. Election.” It focused on the federal government’s role in safeguarding U.S. elections from outside interference. Halderman emphasized that “our highly computerized election infrastructure is vulnerable… Read More »
ITS explores privileged access management
The ITS Identity and Access Management team is exploring Privileged Access Management (PAM) and third-party solutions to mitigate U-M’s cybersecurity risk exposure.
Wireless network update a success – what’s next?
In April, the Michigan Medicine community came together to achieve a significant goal – namely to ensure that enhanced security protocols were in place on all wireless devices connecting to the mission critical network. WiFi security for more than 20,000 devices joining the network daily was the first step in a 19-month initiative to make the IT environment… Read More »
U-M not affected by worldwide ransomware attacks
U-M has not been affected by the widespread global ransomware attacks on computer networks over the weekend. Even with the U-M campuses — including Michigan Medicine — unaffected at this time, the attack remains a serious, ongoing threat. The attack that started May 12 has spread to more than 150 countries and 200,000 computers. For those affected, the attack… Read More »
Private MCommunity groups now hide owners, moderators
Private groups in the MCommunity Directory now hide not only the members, but also the owners and moderators. Aside from enhancing overall MCommunity privacy, this feature, which was implemented May 13, will help make the kind of email spoofing that occurred earlier this year more difficult. It stops would-be email spoofers from discovering and impersonating the moderator of… Read More »
Explore a new way to manage elevated access
Emoji passwords
Would you rather unlock your smartphone with a plain four-digit PIN or with a series of emojis? For example, is it easier (and just more fun) to remember “🐱💦🎆🎌” than “2476”? Smartphone users commonly use emojis to express moods and emotions in emails and text messages. But there had been no formal study of how easy emoji passwords were to… Read More »
Smartphone security hole
A sweeping study by U-M researchers of an internet communication mechanism common in mobile devices has revealed that so-called ‘open ports’ are much more vulnerable to security breaches than previously thought. The vulnerability is most pronounced in Android apps that let users share data across devices and connect to their phones from their computers. One app, called Wifi… Read More »
‘Dissonance’ speakers discuss conflict & cyberspace
On April 13, a panel of experts discussed the development of international cyberspace norms. The event was part of the Dissonance, an ongoing speaker series that explores timely topics at the confluence of technology, law, privacy, and security. Watch the recording Event highlights Discussion points included what constitutes responsible state behavior in cyberspace, the differences between physical attacks and cyberattacks,… Read More »
‘Dissonance’ explores conflict & cyberspace April 13
As cyberspace becomes more and more central to the international security discussion, states are increasingly searching for common “rules of the road.” Attend the next Dissonance event and join Tim Maurer, fellow at the Carnegie Endowment for International Peace, as he moderates a panel discussion on the development of international cyberspace norms. The event is free and light… Read More »
‘Dissonance’ hosts Knight-Wallace fellows
Travel safely with technology
Whether you are planning a vacation or professional trip, you will likely take along smartphone, tablet, laptop, or other mobile device. Follow these tips to safeguard both your own—and the university’s—data. Before you travel Decide whether or not you need all your devices. If you don’t need it, leave it. Consider taking a device that you only use… Read More »
Review new sensitive data classifications
To support the proposed revision of the IT Security Policy, Information Assurance has published revised U-M Data Classification Levels on Safe Computing. The revised policy will be supported and supplemented by specific operational, procedural, and technical standards, many of which specify actions to take based on the classification level of the data involved. The new data classification levels… Read More »
Cyberwar strategy and game theory
Whether a nation should retaliate against a cyber attack is a complicated decision, and a new framework guided by game theory could help policymakers determine the best strategy. The “Blame Game” was developed in part by Robert Axelrod, a professor at the Ford School of Public Policy who is well known for solving a version of the classic… Read More »
Computer Showcase Tech Talks
Check out the upcoming Tech Talks from the Computer Showcase. All sessions will be held 11am – noon at the Computer Showcase location on the Ground Floor of the Michigan Union. March 24: Getting Started with Fitbit Need help choosing a fitness tracker? Whether you want to use heart rate data to take your fitness to the next… Read More »
Michigan Medicine tightens network security
Michigan Medicine is tightening the security for its wired and wireless networks to ensure that only authorized and inventoried computing devices can connect to internal resources. The network project is part of a year-long program to make the IT environment within the academic medical center as secure as possible for all patients, faculty, and staff. The program also… Read More »
Computer Showcase offers secure removable media
Computer Showcase now carries secure Aegis drives from Apricorn, providing encrypted removable media with layers of protection to keep sensitive data safe in transit. The Aegis Padlock Fortress is a 500GB USB 3.0 hard drive with 2 levels of military grade encryption, unique PIN access with programmable auto-lock features, and rugged physical attack protection. Aegis Secure Key offers… Read More »