Skip to content

You’re accessing archived content

This is archived content from the UIT website. Information may be outdated, and links may no longer function. Please contact stratcomm@it.utah.edu if you have any questions about archived content.

May

Weekly office hours support U Cybersecurity Program efforts

Illustration of a pink-hued security lock with thumbprints on its face, on a black background.

Every Thursday from 3:00 p.m. to 4:00 p.m., a cross-functional team of subject matter experts meets online to field questions around the University of Utah Cybersecurity Program, which includes the unit-level implementation of a suite of cybersecurity tools.

Share this article:

Explainer: Network Security Rule (4-004I)

Pink and blue ethernet cables plugged into the back of a network switch.

When correctly implemented, the technical requirements for network security outlined by Rule 4-004I can prevent an interruption of network service or a compromise of the university’s IT security.

Share this article:
Last Updated: 4/2/26