Skip to content

Posts

What you should know about Utah's newest privacy laws

A semi-transparent black shield with a gold outline over the Utah State Capitol.

State legislators continue to build on previous laws, examining data processing as well as privacy rights and expectations and enacting the nation's first major artificial intelligence (AI) law.

Share this article:

UIT recommends U web hosting services over third-party providers

A photo illustration of a desktop computer (clockwise from top), tablet, mobile phone, and laptop whose screens contain an ad that reads

While using an external provider for websites with no sensitive data isn’t against university policy, those services often do not meet the university’s accessibility, branding, and IT security standards, potentially affecting the U’s reputation and safety.

Share this article:

Duo upgrade features new interface, more authentication options

Duo logo

On March 26, the U's Information Security Office upgraded to Duo Universal Prompt, which includes more authentication options and a new interface for the Duo Management Portal, web browsers, and mobile app.

Share this article:

Understanding the U's default protect firewall policy

A white flame on a blue shield, outlined in white and then blue, on a brick wall.

Jake Johansen, director for Enterprise Security in the U’s Information Security Office (ISO), says the initiative is not an effort to filter the websites the university community can access. It's about protecting the U from internet-sourced threats.

Share this article:

Why you should care about data privacy

Data Privacy Week logo

If you use social media, make purchases online, own smart devices, play games online, or do other online activities, you're sharing your data with others. The good news is you can control how your data is used.

Share this article:

Simulated exercises help users identify, avoid phishing

An Apple Watch with

The U's Information Security Office routinely performs simulated phishing exercises to educate users on and increase awareness around phishing, a common technique criminals use to elicit personal information, install malware, and gain access to devices, networks, and systems.

Share this article:

Fitness devices leverage consumer privacy to optimize health

A woman checks her heartbeat on her Apple Watch.

Although health wearables collect a lot of information beyond the scope of your fitness activities, increasing your risk during a data breach, there are still a few key ways to protect your data.

Share this article:

Node 4

Our monthly newsletter includes news from UIT and other campus/ University of Utah Health IT organizations, features about UIT employees, IT governance news, and various announcements and updates.

Subscribe

Categories

Featured Posts

Last Updated: 4/11/22