Skip to content

Posts

IT security tip: Think before you click

A screenshot of the Phish Tank homepage, which shows an anglerfish getting ready to swallow a University of Utah ID card.

Take a couple of extra seconds to evaluate every email — especially those with a link or an attachment — for red flags, including unfamiliar greetings and requests for sensitive information.

Share this article:

Software purchase form doesn't pertain to OSL, PCards

Blue-tinted image of a keyboard key with a shopping cart on it.

A recent Node 4 article about a requirement to use a software purchase request form for all new and renewal software, web-based applications, and mobile application acquisitions — regardless of cost — pertained to UShop.

Share this article:

IT governance roundup

IT Governance

The Strategic Information Technology Committee (SITC) met on May 9. The Enterprise Web Advisory Committee (EWAC) will meet on June 8. The next Architecture and New Technology Committee (ANTC) and Teaching and Learning Portfolio (TLP) meetings are to be determined.

Share this article:

Meet Your Colleagues: USS Student Engineering Team

Image of a University of Utah Asia Campus student's hands typing on a laptop computer. Image courtesy of the University of Utah.

The Student Engineering Team in University Support Services develops, improves, and maintains student-facing technologies for various campus partners, as well as oversees a student management system called Northstar.

Share this article:

Explainer: Remote Access Rule (4-004H)

An illustration of a man standing before a wall with a keyhole opening. Through the opening, a bright line shines out from a city skyscape.

Rule 4-004H outlines the requirements and user responsibilities when accessing the university’s IT resources, information systems, and information assets remotely (e.g., Citrix and virtual private network).

Share this article:

Travel tips to avoid becoming the victim of a cybercrime

Person on an airplane typing on a laptop computer.

Swimsuits and sunblock aren’t the most important things to think about when packing your bags. As you embark upon your next trip, access the Information Security Office offers some best practices to keep your travel free from cybercriminal meddling.

Share this article:

ISO: Do not use Slack for university business

The Slack logo

The U does not have a license for Slack, so it is not approved for university business. It’s also not approved for creating, processing, transmitting, or storing restricted and sensitive data as required by university policy.

Share this article:
Last Updated: 4/11/22