It's easy to stay safe online.
Unfortunately, not everyone thinks this is true. In fact, 41% of survey respondents in 2021 described cybersecurity as intimidating and frustrating, according to the Oh Behave! The Annual Cybersecurity and Attitudes Behavior Report. While most cybersecurity news articles are about massive data breaches and threat actors, it can seem overwhelming and feel like you’re powerless against online threats and attacks.
We want to remind everyone that while there are all kinds of ways to keep your data protected, following just a few key steps can make a big difference. Cybersecurity doesn’t have to be overwhelming.
If everyone does their part, the University of Utah and University of Utah Health will be safer and more secure for our students, patients, faculty, staff, and guests.
Guides: How to stay safe online
Although criminals work constantly to steal our personal information, we can protect ourselves by practicing good cybersecurity.
Threat actors are constantly looking for software and system vulnerabilities, so keeping them up to date is the only way to stay one step ahead.
To keep criminals out of our online accounts, we must secure them properly with strong passwords, multifactor authentication, and some caution.
Phishing is one way criminals use social engineering to trick you into sharing confidential information, such as bank account numbers or login credentials.
We're a CAM Champion!
For the ninth year, the U's Information Security Office (ISO) is participating in Cybersecurity Awareness Month (CAM). The annual initiative — sponsored by the Department of Homeland Security and National Cybersecurity Alliance — ensures that people have the resources they need to stay safer and more secure online. For the fourth year, the University of Utah has been designated a Cybersecurity Awareness Month Champion.
- University of Utah Phish Tank
- Protect your computer or device (IT Knowledge Base article)
- Security essentials — Office of Software Licensing
- 8 simple tips to improve your online safety and security
- Password tester
- Own your role in cybersecurity tip sheet
- Why so many phishing attacks succeed
- Common scams — and how to spot them
- Scam safety tips
- Phishing (IT Knowledge Base article)
- Emails flagged as suspicious message (IT Knowledge Base article)
- Encrypting university email (PHI) (IT Knowledge Base article)
- Report a computer security incident (IT Knowledge Base article)
- Duo two-factor authentication (2FA) overview (IT Knowledge Base article)
- Node 4 article: Don't give up the keys to the castle — be identity smart
- Identity theft (IT Knowledge Base article)