The Information Security Office (ISO) continuously strives for daily operational excellence
to ensure the confidentiality, availability, and integrity of University of Utah information
technology systems and data through appropriate security resources and best practices.
RECENT NEWS
IT security tip: It’s time for a digital spring cleaning
It’s spring — a good time to clean up the clutter on your digital devices.
Outdated apps, browser extensions, data, files, and software can carry more risks than you might expect. Remove what you don’t use anymore and ensure what you keep is needed, up to date, and supported.
Duo upgrade features new interface, more authentication options
On March 26, the U's Information Security Office upgraded to Duo Universal Prompt, which includes more authentication options and a new interface for the Duo Management Portal, web browsers, and mobile app.
IT security tip: Beware of scareware
Scareware, a combination of malicious software and deceptive tactics, preys on users through pop-up scams, tricking them into believing their devices are infected with malware and prompting them to download fake antivirus software or call a phone number for assistance. These scams often mimic legitimate warnings and employ social engineering tactics to induce panic and encourage users to make rash decisions. Cybercriminals exploit users' naivete and lack of IT security knowledge to steal personal data, commit identity theft, and intimidate victims into surrendering money or bank account information.
Top IT Support Topics
- Using a VPN to remotely access the U network
- Duo Two-Factor Authentication (2FA): Adding/Changing a Device
- VPN migration to GlobalProtect
- Reset or change uNID password
- Duo Two-Factor Authentication (2FA): Overview
Helpful Links
- Report a security incident
- Report phishing:
- Use the Phish Alert button
- Email as an attachment to phish@utah.edu
- U of U Policy 4-004: Information Security Policy — Questions? Contact ISO-GRC@utah.edu.
- Org chart: ISO comprises three areas — Enterprise Security; Governance, Risk & Compliance (GRC); and Identity & Access Management (IAM).
U of U IT News & Info
- UIT: Node 4
- ITS: Hardwired (login required)
IT Security advisories
Tips & resources
U of U virtual private network
To access certain resources on the University of Utah network, campus employees and students who work or study remotely and and hospital/clinics personnel who work remotely should use a secure virtual private network (VPN).
- Palo Alto Global Protect
- Departmental VPN
Secure those passwords!
Is your password secure enough?
Easy-to-guess, "weak" passwords are the main way criminals gain access to system information. Keeping passwords safe and hard to guess is critical to ensure information is not compromised.
Take a moment to review the University of Utah's password requirements and guidelines.
IT security software essentials
With antivirus and firewall software, you can better protect your information and reduce the risk to your computers from malicious attacks. Both are available at a reduced cost through the U's Office of Software Licensing (OSL).
Licenses are available for university organizations, work-at-home staff and faculty, and student, faculty, and staff with personally-owned computers.
University-approved platforms for restricted and sensitive data
Due to the level of risk associated with restricted and sensitive data, the university has approved only a select number of platforms for those data types. Our security matrix provides an overview of some popular platforms and the data types for which they are approved.
FERPA: How to securely share and store student data
We created a couple of resources to help instructors and students understand which applications and devices can be used to share and store FERPA-protected data, especially as more of us use new platforms to learn, teach, and connect remotely.
Telecommuting? Follow these IT best practices.
Compared to working on campus, telecommuting can present different information security risks, especially when it comes to network security, data storage, and physical security. By following these best practices, you can help protect yourself and the university from cyberthreats.