Skip to content

Posts

IT security tip: Going beyond the basics

An illustration of two people sitting next to a laptop that has a shield on its screen. On the right is a transparent purple box with white lines to represent text. In the background is a purple wall with shield, document, email, lock, file, cloud, and magnifying glass icons.

While basic IT security practices will help you protect your data, you can take additional steps to make a data breach or cyberattack more difficult for criminals and incident response easier for you.

Share this article:

A data privacy 'GUT Check' for synthetic media like ChatGPT

An illustration of a brain made of geometric shapes on an orange background filled with letters, numbers, and thin lines connected by dots.

With the rise of synthetic media like ChatGPT, it’s important to increase our technological literacy and implement healthy, curious, and cautious data privacy habits to protect our personal information.

Share this article:

Memo: Remove account access for terminated faculty, staff

An illustration of two circles on a blue background containing binary code (ones and zeroes). In the left circle is a blue folder with a closed white lock on it. In the right circle is a red folder with an open white lock.

On March 1, Chief Financial Officer Cathy Anderson and Senior Vice President for Academic Affairs Mitzi Montoya emailed the Council of Academic Deans about appropriately managing account access and university data when faculty and staff leave the U or transfer to another unit.

Share this article:

Explainer: Physical and Facility Security Rule (4-004F)

A photo illustration of a white translucent shield with a keyhole overlaying a darkened image of the University of Utah's Park Building.

Rule 4-004F outlines the requirements to protect university buildings, facilities, IT systems, network and power cables, and other university property, as well as U community members, from myriad threats.

Share this article:

Explainer: Change Management Rule (4-004E)

The Change Management process

The rule ensures that all relevant parties know about IT changes and that the U’s IT systems and resources work properly after any changes. It also makes it easier to prevent unsuccessful changes and implement similar changes in the future.

Share this article:

IT security tip: How to safely dispose of electronic devices

A faded white recycle icon below a pile of electronics.

When you throw away, donate, or recycle an electronic device, you may inadvertently disclose sensitive information that could be exploited by cybercriminals, which is why it's important to secure them properly first.

Share this article:

Duo Mobile ending support for Android 8/9 and iOS 13

The Duo logo

After February 9, users will be unable to download the latest version of the app on Android 8/9, iOS 13, and older operating systems, and Duo will no longer troubleshoot issues, push IT security updates, or provide maintenance fixes for those operating systems.

Share this article:

ISO email will ask users to practice using Phish Alert button

The

On Monday, January 30, 2023, University of Utah students, faculty, and staff and University of Utah Health personnel will receive an email from the U’s Information Security Office about using the Phish Alert button to report suspicious messages.

Share this article:
Last Updated: 4/11/22