Skip to content

Posts

The U is implementing privileged access management. Here's why.

The BeyondTrust logo

The university and its resources are under attack every day. However, by implementing stronger controls on privilege, and on all accounts for those resources, we can make the attackers work much harder to move around laterally and vertically.

Share this article:

Please state your U affiliation in inbound calls, voicemail greetings

New FCC rules help block robocallers.

When answering calls to your university phone number, please identify your affiliation with the University of Utah or University of Utah Health. Similarly, when recording voicemail greetings, please identify your U affiliation in the message.

Share this article:

Digital security tip: Prepare now for seasonal cyberattacks

Criminals will try to scam you during the holidays.

As we prepare for holiday season, criminals are thinking about ways they can capitalize on current events and issues. By thinking ahead and staying alert, however, we can better prepare for potential phishing schemes, social engineering, and other cyberattacks.

Share this article:

Using remote access, and the U's new VPN, responsibly

Remote access

Rule 4-004H: Remote Access outlines the requirements and responsibilities that U students, faculty, staff, and affiliates should follow to properly protect the university’s IT resources when connecting off-site to the U’s network for school or work purposes.

Share this article:

IT security education efforts strengthen the U

IT security training, like Cybersecurity Awareness Month, is available

University Rule 4-004O: Security Awareness and Training mandates information security education to help users recognize IT security concerns and respond accordingly, and understand their information system security roles and responsibilities.

Share this article:

VPN users must use GlobalProtect by the end of 2021

Palo Alto GlobalProtect VPN logo

By next year, all VPN users are expected to switch to GlobalProtect, which will become the central VPN service for all University of Utah and University of Utah Health staff, faculty, students, and affiliates.

Share this article:

This IT security rule helps protect U data. Are you following it?

The U has a rule to protect institutional data — and us.

If the university and its community members don’t comply with Rule 4-004C: Data Classification and Encryption, they not only open the door for potential malicious attacks, they can also be held liable for not safeguarding the data.

Share this article:
Last Updated: 4/11/22