Cyber security summary

Over the past several months, a series of announcements has been published on cyber security and steps that you can take to safeguard yourself, your home, and the university from cyber-attacks. If at any time you want to review the information from the announcements or share with others, simply go to and search for […]

Cyber security tips: Physical security

Physical security is an important part of cyber security. Bad actors can locate physical files disposed of or stored improperly in easily accessible locations, garbage cans, dumpsters, or even copy machines or other devices no longer in use. To keep university data secure, take the following steps: Ensure only authorized personnel access secure locations: BPPM […]

Cyber security tips: Incident response

Even with good defenses and workforce training, the university may still get hacked or have data compromised. Devices can be lost or stolen or an email with sensitive information can go to the wrong person. In accordance with Executive Policy (EP) #8 University Data Policies, every effort must be made to ensure the availability, accuracy, […]

Cyber security tips: Technology alone won’t protect you

When it comes to thwarting the attempts of cyber attackers, you are the university’s best defense! Although technology such as firewalls, antivirus, encryption, etc., are key to maintaining a safe and secure working environment, they cannot protect against all attacks such as viruses, ransomware, and trojans. Any operating system can become infected. Ensure that your […]

Cyber security tips: Social engineering and personalized attacks

Attackers obtain your personal information through publicly available sources such as social media sites or may purchase personal information online. This information is then used to personalize their social engineering scams. They may try and trick you into believing that they have information that would be detrimental if released or that they somehow already have […]

Cyber security tips: Insider threat

Insider threats are people with legitimate access to the university network who use their access in a way that causes harm. Insider threats are difficult to detect and can go unnoticed for months or years. Whether the insider is a malicious employee or a contractor with compromised credentials, the university and university employees must stay […]

Cyber security tips: What’s an endpoint?

You may have seen the recent announcement on cyber security tips for working remotely and noticed several references to endpoints. As we have received follow-up questions about endpoints, we would like to take this opportunity to provide clarification. An endpoint is a remote computing device that communicates back and forth with a network to which […]