Skip to content

The Information Security Office (ISO) continuously strives for daily operational excellence
to ensure the confidentiality, availability, and integrity of University of Utah information technology systems and data through appropriate security resources and best practices.


RECENT NEWS

L-R: Dean Keyek-Franssen, Christopher Bradshaw, Karin Wilcox, Clay Postma, David Roberts, Jim Cannon, Matt Harting, Jake Johansen, Eric Martinez, Ian Johansen, Brendan McDonnell, Ryan Lark, Ben Repak, and Nick Haynes.

‘Cybersecurity superstars’ celebrated at pizza party

Five campus organizations recently achieved a major milestone — successfully implementing a suite of cybersecurity tools, which fulfills a primary requirement of the University of Utah Cybersecurity Program.

Phish Tank homepage.

Neon pink, purple, yellow, and orange outline of a shield containing a pink and orange gradient padlock. Neon white, pink, and purple circles spiral around the shield. Neon blue lines radiate out from the circles. At the end of each line is an icon, such as a Wi-Fi signal, three users, waypoint; some are more in focus than others.

IT security tip: Phish Tank, training available year-round

The Information Security Office encourages you to spend some time with the Phish Tank and cybersecurity awareness training to learn simple tips to protect the university, your colleagues, and the people we serve.

Cybersecurity Awareness Month: 4 steps to secure our world

Observed every October since 2004, Cybersecurity Awareness Month (CAM) aims to highlight some challenges that exist in the world of cybersecurity and provide straightforward, actionable guidance that anyone can follow to create a safe and secure digital world for themselves and others.

 

Tips & resources

University-approved platforms for restricted and sensitive data

Due to the level of risk associated with restricted and sensitive data, the university has approved only a select number of platforms for those data types. Our IT security matrix provides an overview of some university and personal platforms (e.g., Adobe Creative Cloud, Canvas, Microsoft Copilot, and Zoom health care license) and the data types for which they are approved.

READ MORE

U of U virtual private networks

To access certain resources on the University of Utah network, campus employees and students who work or study remotely and hospital/clinics personnel who work remotely should use a secure virtual private network (VPN).

University of Utah VPN options:
  • Palo Alto Global Protect 
  • Departmental VPN

READ MORE

Secure those passwords!

Secure those passwords!

Is your password secure enough?

Easy-to-guess, “weak” passwords are the main way criminals gain access to system information. Keeping passwords safe and hard to guess is critical to ensure information is not compromised.

Take a moment to review the University of Utah’s password requirements and guidelines.

READ MORE   TEST MY PASSWORD

Telecommuting? Follow these IT best practices.

Compared to working on campus, telecommuting can present different information security risks, especially when it comes to network security, data storage, and physical security. By following these best practices, you can help protect yourself and the university from cyberthreats.

READ MORE

FERPA: How to securely share and store student data

We created a couple of resources to help instructors and students understand which applications and devices can be used to share and store FERPA-protected data, especially as more of us use new platforms to learn, teach, and connect remotely.

Flowchart: Is this platform safe? READ MORE

IT security best practices for when you travel

Travel more securely whether you’re going on a roadtrip or on an international adventure. Tips include cybersecurity basics and temporary measures to better protect your information and devices while you are away from home. 

READ MORE

Last Updated: 10/29/24