Skip to content

Posts

Sophisticated, multistep phishing attacks use common tactics

White email message icon with a black exclamation point inside an orange 16-sided star being pulled by a red-orange fish hook on a green background. Around the email, from right, are a black padlock inside an orange rectangle, black asterisks inside an organelle rectangle (representing a password field), and a black and orange credit/debit card icon.

All phishing attacks use similar methods — like an urgent call to action — to trick people into divulging information, giving away money, opening suspicious links, or downloading/installing malicious software.

Share this article:

Data Privacy Week: Web browser privacy review

Four tablets showing different types of browsers.

When selecting a browser, consider the privacy protections it offers, update the default settings, and limit the information you share online.

Share this article:

CISO Corey Roach honored during retirement reception

Chief Information Security Officer Corey Roach holds up a catamaran LEGO set during his retirement reception.

Longtime friends and colleagues gathered at 102 Tower on November 7 to bid Chief Information Security Officer Corey Roach “fair winds and following seas” ahead of his retirement and relocation to the East Coast.

Share this article:

IT security tip: Resources available year-round

Neon orange and yellow outline of a shield containing an orange padlock on an orange background. Neon yellow circles spiral around the shield. Neon yellow lines radiate out from the circles. At the end of each line is an icon, such as a Wi-Fi signal, three users, waypoint; some are more in focus than others.

The Information Security Office encourages you to spend some time with the Phish Tank and cybersecurity awareness training to learn simple tips to protect the university, your colleagues, and the people we serve.

Share this article:

Cybersecurity Awareness Month: Securing our world

Neon pink, purple, yellow, and orange outline of a shield containing a pink and orange gradient padlock. Neon white, pink, and purple circles spiral around the shield. Neon blue lines radiate out from the circles. At the end of each line is an icon, such as a Wi-Fi signal, three users, waypoint; some are more in focus than others.

Observed every October since 2004, Cybersecurity Awareness Month (CAM) aims to highlight some challenges that exist in the world of cybersecurity and provide straightforward, actionable guidance that anyone can follow to create a safe and secure digital world for themselves and others.

Share this article:

UIT preplanning avoids start of semester 'fires'

Two male University of Utah students sit at a study space in Marriott Library. The student on the left is wearing glasses and a gray hoodie. The student on the right is wearing beige shorts and a red polo shirt and is pointing at a laptop computer. Image courtesy of the University of Utah.

Before each new semester, UIT teams and their IT counterparts across campus and University of Utah Health practice a proactive form of “fire prevention” that involves planning IT changes, maintaining software licenses, and leveraging cloud-based resources.

Share this article:

Microsoft Copilot: Compliance and ethical considerations for the AI tool

The Copilot logo above a translucent text box that reads,

Even though the only commercial generative AI tool approved for use at the university comes with risk, users can experiment with it in a safer, more accurate and credible manner by following some key guidelines and behaviors.

Share this article:
Last Updated: 4/11/22