Tag Archives: security

Travel safely with technology

By | March 31, 2017

Whether you are planning a vacation or professional trip, you will likely take along smartphone, tablet, laptop, or other mobile device. Follow these tips to safeguard both your own—and the university’s—data. Before you travel Decide whether or not you need all your devices. If you don’t need it, leave it. Consider taking a device that you only use… Read More »

Review new sensitive data classifications

By | March 29, 2017

To support the proposed revision of the IT Security Policy, Information Assurance has published revised U-M Data Classification Levels on Safe Computing. The revised policy will be supported and supplemented by specific operational, procedural, and technical standards, many of which specify actions to take based on the classification level of the data involved. The new data classification levels… Read More »

Cyberwar strategy and game theory

By | March 24, 2017

Whether a nation should retaliate against a cyber attack is a complicated decision, and a new framework guided by game theory could help policymakers determine the best strategy. The “Blame Game” was developed in part by Robert Axelrod, a professor at the Ford School of Public Policy who is well known for solving a version of the classic… Read More »

Michigan Medicine tightens network security

Michigan Medicine is tightening the security for its wired and wireless networks to ensure that only authorized and inventoried computing devices can connect to internal resources. The network project is part of a year-long program to make the IT environment within the academic medical center as secure as possible for all patients, faculty, and staff. The program also… Read More »

Computer Showcase offers secure removable media

Computer Showcase now carries secure Aegis drives from Apricorn, providing encrypted removable media with layers of protection to keep sensitive data safe in transit. The Aegis Padlock Fortress is a 500GB USB 3.0 hard drive with 2 levels of military grade encryption, unique PIN access with programmable auto-lock features, and rugged physical attack protection. Aegis Secure Key offers… Read More »

“Musical virus” can hack smartphones

By | March 15, 2017

A security loophole that lets someone add extra steps to your Fitbit might seem harmless, but a group of computer security researchers at U-M and the University of South Carolina say it points to the broader risks that come with technology embedding itself into our lives. They found a vulnerability that allows them to compromise devices through the tiny accelerometers that… Read More »

Reminder: Secure your devices if you use them for U-M work

By | February 28, 2017

Security is everyone’s responsibility. If you use your personal devices—smartphone, laptop, tablet, and so on—for work, you are responsible for appropriately securing and managing them, as well as for meeting the obligations described in Security of Personally Owned Devices that Access or Maintain Sensitive Institutional Data (SPG 601.33). Your unit may have additional restrictions beyond those found in… Read More »

Dissonance Series – Privacy & Security Challenges in Investigative Journalism

By | February 26, 2017

Wednesday, March 22; 5:30–6:30 pm; Michigan League, Henderson Room. Join Knight-Wallace Fellows Bastian Obermayer and Laurent Richard as they discuss their work in investigating and reporting on the Panama Papers and Luxembourg Leaks. This discussion will focus on the privacy and IT security challenges in engaging in this high-profile, international investigatory journalism. Admission is free. Light refreshments included. The… Read More »

Integrity of voting systems still a concern

By | February 24, 2017

J. Alex Halderman, professor of computer science and engineering, received a lot of media attention in the days after the 2016 presidential election for voicing concerns about the integrity of electronic voting systems in the U.S. In this extensive interview with The Chronicle of Higher Education, Halderman, director of U-M’s Center for Computer Security and Society, contends that the initial reports… Read More »

Leaks, Whistleblowers and Big Data: Collaborative Journalism Across Borders

By | February 19, 2017

Monday, February 20 2017; 3- 5 pm; Rackham Graduate School (Horace H.) – Rackham Amphitheatre, fourth floor. Wallace House presents the investigative journalists behind The Panama Papers and Luxembourg Leaks. A panel of Knight-Wallace Fellows and the deputy director for The International Consortium of Investigative Journalists (ICIJ) will share the stories behind the biggest data leaks in history, the… Read More »

Forged emails sent to CoE groups

By | February 10, 2017

On Tuesday, February 7, forged emails carrying messages of hate were sent to several College of Engineering email groups from an anonymous email server. The messages were “spoofed” so they appeared to come from an engineering faculty member and a doctoral student. They did not send the messages. The U-M Police Department and the FBI are conducting a joint… Read More »

Cybersecurity forecast

By | February 6, 2017

Hacks and data breaches continue to make headlines—including during the presidential election—but that hasn’t seemed to worry consumers, or even many policymakers. M.S. Krishnan, the Accenture Professor of Computer Information at the Ross School of Business, says that while security breaches haven’t changed consumer behavior, it’s time for a cybersecurity summit. Krishnan, who is also professor of technology and… Read More »

U-M updates protection agreement with Piazza

ITS Teaching and Learning, working in conjunction with the U-M Office of the Vice President and General Counsel; the Office of the Vice President for Information Technology and Chief Information Officer; and Procurement Services, has secured a new data protection agreement in December with the online collaboration Q&A platform Piazza Technologies. Piazza Q&A, which has been available for… Read More »

5 tips to avoid online tax fraud

By | January 28, 2017

Criminals can file fraudulent tax returns in your name—and steal your tax refund. Last year, several U-M employees were among the many nationwide who were victimized by tax fraud. This year, we are already seeing phishing scams targeting W-2s. Information and Infrastructure Assurance (IIA) offers the following five tips to help you avoid online tax fraud: Practice safe computing by… Read More »

What to do if your U-M account is compromised

By | January 11, 2017

Have you noticed messages in your sent folder that you didn’t send? Did your co-workers receive strange emails from you? If so, your U-M account might be compromised, and you should take action immediately. Change your UMICH (Level-1) password For instructions and tips, see Choosing and Changing a Secure UMICH Password. You should also set new security questions… Read More »

Cleared for take-off

By | January 7, 2017

A U-M alum is striving to take the turbulence out of getting passengers to their planes on time. Caryn Seidman-Becker is CEO of CLEAR, which helps airline passengers at participating airports confirm their identity through biometric scanning of either their fingertip or iris. Customers sign up with CLEAR in advance and have their identification digitally authenticated. Then they… Read More »

Securing the IoT

By | December 15, 2016

After recent attacks threw the rampant insecurities of internet-connected cameras, video recorders, and other gadgets into sharp relief, Washington lawmakers and officials are urging tech firms to do more to secure the Internet of Things. At a House Energy and Commerce subcommittee hearing last month, lawmakers said the attacks raised national security concerns and questions about the need… Read More »