Skip to content

Posts

DLT reminds U community to guard against Zoom bombing

Illustration of a laptop computer with four figures on screen, depicting an online meeting, on a teal background. The shadowy figure in the upper right corner is wearing a hat, sunglasses, and trench coat, and is meant to represent an uninvited guest.

UIT Digital Learning Technologies urges U community members to guard against malicious gate-crashers who exploit online collaboration and video conferencing tools — particularly, a form of digital harassment known as “Zoom bombing.”

Share this article:

U of U Health orgs celebrate cybersecurity toolset implementation

Standing, from left: Brad Avery, Lewis Hofmann, Rebwar Baesmat, Dylan Russel, Gabe Mickel, Kelly Tappenden, Kelly Marosok, Amen Koutowogbe, Jason Genovesi, and Clay Postma; kneeling, from left: Cody Rasmussen and Muazzamfaraaz Mohammed.

To mark the U of U Health organizations’ achievement, UIT Partner Relations hosted a celebration with plenty of pizza, cybersecurity star T-shirts, and gratitude for the hard work that made it all possible.

Share this article:

Sophisticated, multistep phishing attacks use common tactics

White email message icon with a black exclamation point inside an orange 16-sided star being pulled by a red-orange fish hook on a green background. Around the email, from right, are a black padlock inside an orange rectangle, black asterisks inside an organelle rectangle (representing a password field), and a black and orange credit/debit card icon.

All phishing attacks use similar methods — like an urgent call to action — to trick people into divulging information, giving away money, opening suspicious links, or downloading/installing malicious software.

Share this article:

Data Privacy Week: Web browser privacy review

Four tablets showing different types of browsers.

When selecting a browser, consider the privacy protections it offers, update the default settings, and limit the information you share online.

Share this article:

CISO Corey Roach honored during retirement reception

Chief Information Security Officer Corey Roach holds up a catamaran LEGO set during his retirement reception.

Longtime friends and colleagues gathered at 102 Tower on November 7 to bid Chief Information Security Officer Corey Roach “fair winds and following seas” ahead of his retirement and relocation to the East Coast.

Share this article:

IT security tip: Resources available year-round

Neon orange and yellow outline of a shield containing an orange padlock on an orange background. Neon yellow circles spiral around the shield. Neon yellow lines radiate out from the circles. At the end of each line is an icon, such as a Wi-Fi signal, three users, waypoint; some are more in focus than others.

The Information Security Office encourages you to spend some time with the Phish Tank and cybersecurity awareness training to learn simple tips to protect the university, your colleagues, and the people we serve.

Share this article:

Cybersecurity Awareness Month: Securing our world

Neon pink, purple, yellow, and orange outline of a shield containing a pink and orange gradient padlock. Neon white, pink, and purple circles spiral around the shield. Neon blue lines radiate out from the circles. At the end of each line is an icon, such as a Wi-Fi signal, three users, waypoint; some are more in focus than others.

Observed every October since 2004, Cybersecurity Awareness Month (CAM) aims to highlight some challenges that exist in the world of cybersecurity and provide straightforward, actionable guidance that anyone can follow to create a safe and secure digital world for themselves and others.

Share this article:

Node 4

Our monthly newsletter includes news from UIT and other campus/ University of Utah Health IT organizations, features about UIT employees, IT governance news, and various announcements and updates.

Subscribe

Categories

Featured Posts

Last Updated: 4/11/22