The Information Security Office (ISO) continuously strives for daily operational excellence to ensure the confidentiality, availability, and integrity of University of Utah information technology systems and data through exploitation of appropriate security resources and best practices.
Recent NewsMore Security News
UIT Leadership Spotlight: Trevor Long, Associate Director, Governance, Risk & Compliance
The Information Security Office associate director, who models his leadership style after his first boss at the University of Utah, said trust is crucial in order for employees to thrive in the workplace.
Don’t give up the keys to the castle — be identity smart
ISO provided ‘monumental’ support for Carson Tahoe project
Several UIT teams worked with U of U Health to implement Epic and MyChart at the Carson Tahoe Health system in Nevada — a momentous feat that included 72 interface builds, 130,000 total work hours, and 500,000 patient records.
tips & resources


University-approved platforms for restricted and sensitive data
Due to the level of risk associated with restricted and sensitive data, the university has approved only a select number of platforms for those data types. Our security matrix provides an overview of some popular platforms and the data types for which they are approved.
FERPA: How to securely share and store student data
We created a couple of resources to help instructors and students understand which applications and devices can be used to share and store FERPA-protected data, especially as more of us use new platforms to learn, teach, and connect remotely.


Telecommuting? Follow these security best practices.
Compared to working on campus, telecommuting can present different information security risks, especially when it comes to network security, data storage, and physical security. By following these best practices, you can help protect yourself and the university from cyberthreats.
Using a VPN to access the campus network
To access certain resources on the University of Utah network, university employees and students working or studying remotely should use a secure virtual private network (VPN).
- Cisco AnyConnect
- Palo Alto Global Protect
- Departmental VPN
Phishing lessons
You realize it a moment too late: You fell for a malicious email, clicked a bad link, and entered your password on a suspicious site. You’ve just been phished! Now what?
If you click on a questionable link and enter login credentials, immediately change your password in the CIS portal — and in any personal accounts that may be compromised.


Secure those passwords!
Is your password secure enough?
Easy-to-guess, "weak" passwords are the main way criminals gain access to system information. Keeping passwords safe and hard to guess is critical to ensure information is not compromised.
Take a moment to review the University of Utah's password requirements and guidelines.
Add an extra layer of protection to your university accounts
According to the FBI and U.S. Department of Homeland Security, higher education institutions are increasingly becoming a target for cybercriminals. Multi-factor authentication (MFA) decreases the chances of a security attack because the criminal cannot access data with your login credentials alone.
That’s where Duo two-factor authentication (2FA) comes in — the idea that you are authenticating your identity via two separate factors, one of which isn’t your password.
SECURITY CHAMPS
The Information Security Office is looking for engaged, enthusiastic Security Champs to help us strengthen university-wide information security risk management through education and collaboration.
The next meeting is April 28, 2021, at noon via Zoom.
Helpful Links
- Report a security incident
- Report phishing to phish@utah.edu
- U of U Policy 4-004: Information Security Policy — Questions? Contact ISO-GRC@utah.edu.
- Org chart: ISO comprises four areas — Enterprise Security; Governance, Risk & Compliance (GRC); Identity & Access Management (IAM); and Security Assurance.
UofU IT News & Info
- UIT: Node 4
- ITS: Hardwired (authentication required)