You are here:

Week 3: Today's Predictions for Tomorrow's Internet

Digital interconnectivity requires more than the internet. It requires information about you

You should be protective of your electronic information in the same way you would be protective of your purse, wallet, or backpack.

New and cutting-edge technology is available for every aspect of our lives: our homes, our work, transportation, and even our health. When you’re considering what technologies to incorporate into your life, make sure you understand:

  • What personal data is required
  • Who owns that data about you
  • How the service provider or manufacturer stores and protects its data about you
  • The service provider or manufacturer’s End-User License Agreement (EULA)
    • Are you authorizing the sale of your information?
    • Are you allowing unnamed partners access to your information?

Tips to securing your network, Internet of Things, and medical devices

Secure your home network

Going wireless in the home is easy and convenient. We connect our mobile devices and computers to the home network, but often, devices like our televisions, appliances, and baby monitors connect as well. Follow these tips to secure your home network:

  • Change the default password
  • Do not stay logged in to the management account for your router
  • Change the name of your router
  • Manage the security options
  • Monitor the devices that connect to your home network
  • Create guest accounts for visitors to your home
  • Use a firewall
  • Keep router software up-to-date

The Internet of Things (IoT)

The Internet of Things (IoT) is all about connecting everyday devices, like your home lights, electronics, or appliances, to the internet. Though IoT provides ease and simplicity in our lives, there are still risks. It is important to consider sensitive information you may leave open to exposure (e.g. baby monitors, cameras).

  • If possible, password protect your IoT devices
  • Keep your IoT devices up-to-date just like you would your smartphone or computer
  • Understand the data the device is collecting and how it is used
  • Additional tips:

Medical devices

According to the FDA:

Medical devices, like other computer systems, can be vulnerable to security breaches, potentially impacting the safety and effectiveness of the device. This vulnerability increases as medical devices are increasingly connected to the internet, hospital networks, and to other medical devices.

Stay up-to-date on medical device regulation and medical device safety communications by visiting the FDA's website.

How to report cyber security incidents at the U

The Information Security Office (ISO) will respond to and investigate incidents related to misuse or abuse of University of Utah information and information technology resources. This includes computer and network security breaches, unauthorized disclosure or modification of institutional or personal data, and security credential malware phishing.

Reporting an incident can be done by reporting to your designated help desk:

Hospitals & Clinics: 801-587-6000
Main Campus: 801-581-4000 option 1

Helpful Links

Tweets by ISO

Last Updated: 9/30/18