Skip to content

Weekly office hours support U Cybersecurity Program efforts

Illustration of a pink-hued security lock with thumbprints on its face, on a black background.

Every Thursday from 3:00 p.m. to 4:00 p.m., a cross-functional team of subject matter experts meets online to field questions around the University of Utah Cybersecurity Program, which includes the unit-level implementation of a suite of cybersecurity tools.

Share this article:

Explainer: Network Security Rule (4-004I)

Pink and blue ethernet cables plugged into the back of a network switch.

When correctly implemented, the technical requirements for network security outlined by Rule 4-004I can prevent an interruption of network service or a compromise of the university’s IT security.

Share this article:

Node 4

Our monthly newsletter includes news from UIT and other campus/ University of Utah Health IT organizations, features about UIT employees, IT governance news, and various announcements and updates.

Subscribe


Warning: unserialize(): Extra data starting at offset 1151564 of 1152597 bytes in /var/www/html/_resources/oublog/blog-functions.php on line 458

Categories

Featured Posts

Last Updated: 5/31/23