The Information Security Office (ISO) continuously strives for daily operational excellence
to ensure the confidentiality, availability, and integrity of University of Utah
information technology systems and data through exploitation of appropriate security resources and best practices.
Recent News More Security News
With the shift to remote learning and working during the COVID-19 outbreak, the Information Security Office (ISO) warns that members of the University of Utah community could become targets for malicious gate-crashers through online collaboration and video conferencing tools.
Due to a significant increase in COVID-19 phishing attempts, the Information Security Office (ISO) recently urged students, faculty and staff to remain cautious and alert for potential scams during the outbreak. Unfortunately, cybercriminals are hoping to cash in on the international pandemic and they’ll try just about anything to exploit others.
The U's Information Security Office (ISO) is urging students, faculty, and staff to remain cautious and alert to possible phishing scams designed to coincide with the COVID-19 outbreak. U community members are encouraged to scrutinize official-looking emails and watch for the following common signs of an email phishing attempt.
tips & resources
You realize it a moment too late: You fell for a malicious email, clicked a bad link, and entered your password on a suspicious site. You’ve just been phished! Now what?
If you click on a questionable link and enter login credentials, immediately change your password in the CIS portal — and in any personal accounts that may be compromised.
The Information Security Office is looking for engaged, enthusiastic Security Champs to help us strengthen university-wide information security risk management through education and collaboration.
- Report a security incident
- Report phishing to email@example.com
- U of U Policy 4-004: Information Security Policy — Questions? Contact ISO-GRC@utah.edu.
- Org chart: ISO comprises four areas — Enterprise Security; Governance, Risk & Compliance (GRC); Identity & Access Management (IAM); and Security Assurance.