If the university and its community members don’t comply with Rule 4-004C: Data Classification
and Encryption, they not only open the door for potential malicious attacks, they
can also be held liable for not safeguarding the data.
Stucker will resume his responsibilities as associate director for the Identity &
Access Management team in the Information Security Office on Wednesday, September
tips & resources
University-approved platforms for restricted and sensitive data
Due to the level of risk associated with restricted and sensitive data, the university
has approved only a select number of platforms for those data types. Our security
matrix provides an overview of some popular platforms and the data types for which
they are approved.
FERPA: How to securely share and store student data
We created a couple of resources to help instructors and students understand which
applications and devices can be used to share and store FERPA-protected data, especially
as more of us use new platforms to learn, teach, and connect remotely.
Flowchart: Is this platform safe? READ MORE
Telecommuting? Follow these security best practices.
Compared to working on campus, telecommuting can present different information security
risks, especially when it comes to network security, data storage, and physical security.
By following these best practices, you can help protect yourself and the university
Using a VPN to access the campus network
To access certain resources on the University of Utah network, university employees
and students working or studying remotely should use a secure virtual private network
University of Utah VPN options:
- Cisco AnyConnect
- Palo Alto Global Protect
- Departmental VPN
You realize it a moment too late: You fell for a malicious email, clicked a bad link,
and entered your password on a suspicious site. You’ve just been phished! Now what?
If you click on a questionable link and enter login credentials, immediately change
your password in the CIS portal — and in any personal accounts that may be compromised.
Secure those passwords!
Is your password secure enough?
Easy-to-guess, "weak" passwords are the main way criminals gain access to system information.
Keeping passwords safe and hard to guess is critical to ensure information is not
Take a moment to review the University of Utah's password requirements and guidelines.
TEST MY PASSWORD
Add an extra layer of protection to your university accounts
According to the FBI and U.S. Department of Homeland Security, higher education institutions
are increasingly becoming a target for cybercriminals. Multi-factor authentication
(MFA) decreases the chances of a security attack because the criminal cannot access
data with your login credentials alone.
That’s where Duo two-factor authentication (2FA) comes in — the idea that you are
authenticating your identity via two separate factors, one of which isn’t your password.
We're a 2021
As a Cybersecurity Awareness Month (CSAM) Champion, the University of Utah affirms its committment to promoting a safer, more secure,
and more trusted internet today and every day.
Stay tuned: Join us in October for our annual CSAM campaign.
The Information Security Office is looking for engaged, enthusiastic Security Champs
to help us strengthen university-wide information security risk management through
education and collaboration.
UofU IT News & Info
ISO ON TWITTER