Skip to content


Why you should care about data privacy

Data Privacy Week logo

If you use social media, make purchases online, own smart devices, play games online, or do other online activities, you're sharing your data with others. The good news is you can control how your data is used.

Share this article:

Simulated exercises help users identify, avoid phishing

An Apple Watch with

The U's Information Security Office routinely performs simulated phishing exercises to educate users on and increase awareness around phishing, a common technique criminals use to elicit personal information, install malware, and gain access to devices, networks, and systems.

Share this article:

Fitness devices leverage consumer privacy to optimize health

A woman checks her heartbeat on her Apple Watch.

Although health wearables collect a lot of information beyond the scope of your fitness activities, increasing your risk during a data breach, there are still a few key ways to protect your data.

Share this article:

President Randall approves revised information security policy

The U's Park Building, overlaid with a duotone of yellow and orange

The changes comply with the recently updated USHE Board Policy R345: Information Technology Resource Security and strengthen the university’s information security policy to address the present and increasing risks of cybersecurity incidents.

Share this article:

Shields up! Protect yourself online with these simple steps.

A white outline of a shield with a keyhole surrounded by circles of dotted and dashed lines on top of a purple-hued image of the Earth. The photo illustration includes ones and zeros, and technology icons to the left and right of the shield.

October, designated as Cybersecurity Awareness Month, is a good time to review the basics of cybersecurity — easy and common-sense ways to protect your data and devices from threat actors and cybercriminals.

Share this article:

Explainer: Backup and Recovery Rule (4-004K)

A pink-hued illustration of a cloud behind three round storage servers with binary code in the background. Various icons make up each square of the cloud.

The Backup and Recovery Rule outlines the requirements for backup and recovery of the U’s information systems and data in the event of a natural disaster, system failure, ransomware, or similar disruption.

Share this article:

Explainer: Log Management and Monitoring Rule (4-004J)

Green and orange lines of code on a dark background.

The rule outlines the configuration, review, and IT security requirements for the log management and monitoring of the U’s information systems to help detect unauthorized activity, assist in IT security incident investigations, and protect the university’s data and information systems.

Share this article:
Last Updated: 4/11/22