Skip to content

Posts

IT security tip: Resources available year-round

Neon orange and yellow outline of a shield containing an orange padlock on an orange background. Neon yellow circles spiral around the shield. Neon yellow lines radiate out from the circles. At the end of each line is an icon, such as a Wi-Fi signal, three users, waypoint; some are more in focus than others.

The Information Security Office encourages you to spend some time with the Phish Tank and cybersecurity awareness training to learn simple tips to protect the university, your colleagues, and the people we serve.

Share this article:

Cybersecurity Awareness Month: Securing our world

Neon pink, purple, yellow, and orange outline of a shield containing a pink and orange gradient padlock. Neon white, pink, and purple circles spiral around the shield. Neon blue lines radiate out from the circles. At the end of each line is an icon, such as a Wi-Fi signal, three users, waypoint; some are more in focus than others.

Observed every October since 2004, Cybersecurity Awareness Month (CAM) aims to highlight some challenges that exist in the world of cybersecurity and provide straightforward, actionable guidance that anyone can follow to create a safe and secure digital world for themselves and others.

Share this article:

UIT preplanning avoids start of semester 'fires'

Two male University of Utah students sit at a study space in Marriott Library. The student on the left is wearing glasses and a gray hoodie. The student on the right is wearing beige shorts and a red polo shirt and is pointing at a laptop computer. Image courtesy of the University of Utah.

Before each new semester, UIT teams and their IT counterparts across campus and University of Utah Health practice a proactive form of “fire prevention” that involves planning IT changes, maintaining software licenses, and leveraging cloud-based resources.

Share this article:

Microsoft Copilot: Compliance and ethical considerations for the AI tool

The Copilot logo above a translucent text box that reads,

Even though the only commercial generative AI tool approved for use at the university comes with risk, users can experiment with it in a safer, more accurate and credible manner by following some key guidelines and behaviors.

Share this article:

Microsoft login service upgrade begins on August 6

A screen capture of the new Microsoft login page, with the sign-in box in the center of the screen.

The update, which includes a refreshed interface and improves the IT security and performance of the Microsoft authentication process, will roll out over several weeks.

Share this article:

What you should know about Utah's newest privacy laws

A semi-transparent black shield with a gold outline over the Utah State Capitol.

State legislators continue to build on previous laws, examining data processing as well as privacy rights and expectations and enacting the nation's first major artificial intelligence (AI) law.

Share this article:

UIT recommends U web hosting services over third-party providers

A photo illustration of a desktop computer (clockwise from top), tablet, mobile phone, and laptop whose screens contain an ad that reads

While using an external provider for websites with no sensitive data isn’t against university policy, those services often do not meet the university’s accessibility, branding, and IT security standards, potentially affecting the U’s reputation and safety.

Share this article:
Last Updated: 4/11/22