The Information Security Office (ISO) continuously strives for daily operational excellence
to ensure the confidentiality, availability, and integrity of University of Utah
information technology systems and data through exploitation of appropriate security resources and best practices.
Privacy has become an expectation. When we share information on social media or shop online, there's an expectation that our correspondence, posts, and even our shopping habits and purchases will remain confidential.
That, however, may not always be the case. That's why it's important to be active participants in discussions and efforts regarding data privacy.
Windows 7 users should have upgraded to Windows 10 before January 14, 2020, when the popular operating system reached its end of life (EOL). On that date, Microsoft formally ended "extended support" — free patches for security issues and bugs — and left unsupported PCs exposed to exploits.
"The cost of an incident is significantly higher than the cost of upgrading to Windows 10. It's not a risk worth taking," said Dustin Udy, Security Assessment team lead in UIT's Information Security Office (ISO).
The annual SAINTCON (Security Advisory and Incident Network Team Conference) features presentations and activities that provide various levels of security instruction and training, from fundamentals to advanced techniques.
It’s not unusual to find UIT employees at the Provo conference, either as attendees or speakers. This year, Chief Information Security Officer Corey Roach spoke during the leadership track.
You realize it a moment too late: You fell for a malicious email, clicked a bad link, and entered your password on a suspicious site. You’ve just been phished! Now what?
If you click on a questionable link and enter login credentials, immediately change your password in the CIS portal — and in any personal accounts that may be compromised.
The Information Security Office is looking for engaged, enthusiastic Security Champs to help us strengthen university-wide information security risk management through education and collaboration.
- Report a security incident
- Report phishing to email@example.com
- U of U Policy 4-004: Information Security Policy — Questions? Contact ISO-GRC@utah.edu.
- Org chart: ISO comprises four areas — Enterprise Security; Governance, Risk & Compliance (GRC); Identity & Access Management (IAM); and Security Assurance.