Skip to content

Posts

Microsoft login service upgrade begins on August 6

A screen capture of the new Microsoft login page, with the sign-in box in the center of the screen.

The update, which includes a refreshed interface and improves the IT security and performance of the Microsoft authentication process, will roll out over several weeks.

Share this article:

What you should know about Utah's newest privacy laws

A semi-transparent black shield with a gold outline over the Utah State Capitol.

State legislators continue to build on previous laws, examining data processing as well as privacy rights and expectations and enacting the nation's first major artificial intelligence (AI) law.

Share this article:

UIT recommends U web hosting services over third-party providers

A photo illustration of a desktop computer (clockwise from top), tablet, mobile phone, and laptop whose screens contain an ad that reads

While using an external provider for websites with no sensitive data isn’t against university policy, those services often do not meet the university’s accessibility, branding, and IT security standards, potentially affecting the U’s reputation and safety.

Share this article:

Duo upgrade features new interface, more authentication options

Duo logo

On March 26, the U's Information Security Office upgraded to Duo Universal Prompt, which includes more authentication options and a new interface for the Duo Management Portal, web browsers, and mobile app.

Share this article:

Understanding the U's default protect firewall policy

A white flame on a blue shield, outlined in white and then blue, on a brick wall.

Jake Johansen, director for Enterprise Security in the U’s Information Security Office (ISO), says the initiative is not an effort to filter the websites the university community can access. It's about protecting the U from internet-sourced threats.

Share this article:

Why you should care about data privacy

Data Privacy Week logo

If you use social media, make purchases online, own smart devices, play games online, or do other online activities, you're sharing your data with others. The good news is you can control how your data is used.

Share this article:

Simulated exercises help users identify, avoid phishing

An Apple Watch with

The U's Information Security Office routinely performs simulated phishing exercises to educate users on and increase awareness around phishing, a common technique criminals use to elicit personal information, install malware, and gain access to devices, networks, and systems.

Share this article:
Last Updated: 4/11/22