You are here:

Information Security Office (ISO)

The Information Security Office (ISO) continuously strives for daily operational excellence to ensure the confidentiality, availability, and integrity of University of Utah information technology systems and data through exploitation of appropriate security resources and best practices.

Helpful Links

 Enroll in 2FA

ISO Quick Links

Tips to Staying Secure Online All Year Long 

Cybersecurity Month

Beware of phishing

 Noteworthy News

 Meet Your Colleagues: ISO Security Assurance

ISO Security Assurance

Guarding against thousands of cyber attacks each week keeps Colby Gray, Security Assurance manager in UIT's Information Security Office, and his dedicated team of security analysts busy.

Read the full Node 4 Article


Information Security Policy 4-004

The Information Security Team at the University of Utah has released a video regarding Information Security Policy 4-004.  This policy, including its accompanying rules regarding Acceptable Use, Data Classification and Encryption is now fully enforceable as of April 2016. If you have questions or concerns, please contact


UConnect vs. UGuest

Students, faculty, and staff: UConnect is our secure, wireless network. UGuest is not. Always use UConnect when connecting to the network.

First time connecting to UConnect? Follow these instructions.

Secure those passwords! 

Is your password secure enough? Easy-to-guess, "weak" passwords are the main way malicious hackers gain access to system information. Keeping passwords safe and hard to guess is critical to ensure information is not compromised.

Familiarize yourself with the University of Utah's password requirements and guidelines.



DATE(S) ISSUED: 02/14/2017

SUBJECT: Multiple Vulnerabilities in Adobe Flash Player Could Allow for Remote Code Execution (APSB17-04)

OVERVIEW: Multiple vulnerabilities have been discovered in Adobe Flash Player, the most severe of which could allow for remote code execution. Adobe Flash Player is a widely distributed multimedia and application player used to enhance the user experience when visiting web pages or reading email messages. Successful exploitation of the most severe of these vulnerabilities could result in the attacker gaining control of the affected system.

More MS-ISAC Advisories can be found HERE.

US-CERT Alerts can be found HERE.

Last Updated: 2/15/17