Skip to content

Posts

Everyone is interested in your identity, including cybercriminals

Everyone’s interested in your identity — from Amazon to cybercriminals

Amazon, Google, and other online businesses know that you are the key to their success, so they focus on collecting information about you. Cybercriminals do the same. This Identity Management Day, the ISO encourages you to take extra steps to protect your online accounts and devices.

Share this article:

Digital security tip: Beware of tax scams

Digital security tip: You can’t avoid tax scams, but you can defend against them

Tax season is here again and so are tax scams. Criminals use tax season as an opportunity to phish us in emails, to socially engineer us in other mediums, and to steal our identities in a variety of ways.

Share this article:

AnyConnect VPN will be retired on May 12

Palo Alto GlobalProtect logo

Cisco AnyConnect virtual private network (VPN) infrastructure will be retired on May 12, 2022. University of Utah and University of Utah Health VPN users must install and start to use the Palo Alto GlobalProtect VPN client before this date.

Share this article:

Take control of the info you share with app developers

Many apps collect your personal and health data.

Data Privacy Week is an excellent time to review which applications have access to your personal and health data, particularly if you downloaded them for free.

Share this article:

File sharing and copyright violation notice

It is a violation of federal law and university policy to share and/or distribute copyrighted materials without the permission of the copyright holder.

It is a violation of federal law and university policy to share and/or distribute copyrighted materials without the permission of the copyright holder.

Share this article:

Digital security tip: Secure your home network

The ISO recommends that users improve their home network security.

This holiday season, the Information Security Office recommends that members of the university community take a few minutes to improve the security of their home networks — especially if someone in their household receives a new tech device as a gift.

Share this article:

The U is implementing privileged access management. Here's why.

The BeyondTrust logo

The university and its resources are under attack every day. However, by implementing stronger controls on privilege, and on all accounts for those resources, we can make the attackers work much harder to move around laterally and vertically.

Share this article:

Please state your U affiliation in inbound calls, voicemail greetings

New FCC rules help block robocallers.

When answering calls to your university phone number, please identify your affiliation with the University of Utah or University of Utah Health. Similarly, when recording voicemail greetings, please identify your U affiliation in the message.

Share this article:

Node 4

Our monthly newsletter includes news from UIT and other campus/ University of Utah Health IT organizations, features about UIT employees, IT governance news, and various announcements and updates.

Subscribe

Categories

Featured Posts

Last Updated: 4/11/22