Skip to content

Posts

IT security education efforts strengthen the U

IT security training, like Cybersecurity Awareness Month, is available

University Rule 4-004O: Security Awareness and Training mandates information security education to help users recognize IT security concerns and respond accordingly, and understand their information system security roles and responsibilities.

Share this article:

VPN users must use GlobalProtect by the end of 2021

Palo Alto GlobalProtect VPN logo

By next year, all VPN users are expected to switch to GlobalProtect, which will become the central VPN service for all University of Utah and University of Utah Health staff, faculty, students, and affiliates.

Share this article:

This IT security rule helps protect U data. Are you following it?

The U has a rule to protect institutional data — and us.

If the university and its community members don’t comply with Rule 4-004C: Data Classification and Encryption, they not only open the door for potential malicious attacks, they can also be held liable for not safeguarding the data.

Share this article:

Top IT resources for U students, faculty, and staff

IT resources available to U students include laptops from Marriott Library.

Whether you are a new or returning student, faculty member, or staff member, these five IT resources/services will prepare you for the year ahead and set you up for success.

Share this article:

IT security policies are critical to the U's mission

IT policies are critical to the U's mission

If you’re the average University of Utah faculty or staff member, it’s possible you’ve never read the U’s information technology and IT security policies. Whether you have or have not, we all must follow them — and for good reason, too.

Share this article:

Town hall recap: Telecommuters must follow IT security policies

Steve Hess, chief information officer

During a recent U town hall, CIO Steve Hess addressed the IT security issues that come with telecommuting, including concerns about data privacy and work on personal devices. He urged employees (and students) to review and follow university IT regulations.

Share this article:

Securing payments on a mostly cashless campus

A person at a laptop computer conducts a credit card transaction online.

To keep vast sums of restricted credit card processing data locked down, the university adheres to strict payment card industry data security standards.

Share this article:
Last Updated: 4/11/22