Skip to content

Posts

IT security tip: Going beyond the basics

An illustration of two people sitting next to a laptop that has a shield on its screen. On the right is a transparent purple box with white lines to represent text. In the background is a purple wall with shield, document, email, lock, file, cloud, and magnifying glass icons.

While basic IT security practices will help you protect your data, you can take additional steps to make a data breach or cyberattack more difficult for criminals and incident response easier for you.

Share this article:

UCL Digital Learning teams will merge with UIT on May 1

Director Jon Thomas

The reorganization includes the following University Connected Learning (UCL) units: Systems & Data Services, AV & Technology Services, and Outreach & Innovation Services. The new UIT unit, called Digital Learning Technologies (DLT), will be led by Director Jon Thomas.

Share this article:

ISO announcement: organization realignment

Top row, L-R: Trevor Long, director of Governance, Risk, & Compliance, and Dave Packham, director of Identity & Access Management. Bottom row, L-R: Jesse Adams, associate director of the Security Operations Center, and Dustin Udy, associate director of Security Assurance. Not pictured: Jake Johansen, director of Enterprise Security.

Chief Information Security Officer Corey Roach is pleased to announce a set of promotions in the Information Security Office.

Share this article:

IT governance roundup

IT Governance

The Enterprise Web Advisory Committee (EWAC) met on April 13 and the Teaching and Learning Portfolio (TLP) will meet on April 26. The Strategic Information Technology Committee (SITC) will reconvene on May 9 and the Architecture and New Technology Committee (ANTC) will meet again on May 22.

Share this article:

David Young's game collection preserves classic arcade vibe

Time Traveler is a hologram-like game that SEGA released in 1991.

Young, manager of the U’s Downtown Data Center warehouse, enjoys refurbishing “anything that takes a quarter,” and owns all the top games from the early era of arcades — from Crystal Castles to Tron.

Share this article:

Endpoint privilege management pilot program is underway

A person in a collared shirt sits at a computer with his hands on the keyboard. A container with pens and pencils appears in the lower right-hand corner.

The way administrator privileges are assigned for university-owned and -managed Mac and Windows computers, as well as command-line permissions, will soon change. UIT will install endpoint privilege management (EPM) packages on qualifying computers.

Share this article:
Last Updated: 4/11/22