Practice Safe Computing
Services & Technologies
Incident Response for Information Security
Report suspected or discovered information security incidents to University Information Security. University Information Security will notify you of next steps.
Current students, faculty, and staff are required to use Duo Security (two-factor authentication) at the University of Minnesota Sign-in page. Duo Security adds a layer of protection by requiring you to verify your identity with two factors: something you know (your password) and something you have (your device). Duo enables you to deny access to your accounts if someone is trying to sign in as you.
Computer & Device Support & Maintenance
Request computer and device support including security patching, updates, and maintaining the general health of the devices.
Consultations on Information Security
Consult University Information Security when you have questions involving private data, the security of technology provided by a vendor, or how to protect payment card information. Our staff also consults with University members on information security in architecture, software acquisition, governance and compliance requirements, business processes, and network design.
Secure, collaborative, and cloud based storage for highly protected data including HIPAA data.
Virtual Private Network (VPN)
Access the University network securely – even when you're not on campus – with the University Virtual Private Network (VPN). Use VPN when you are connected to a non-University guest WiFi networks, connecting to the University network from an off-campus Internet Service Provider, or transmitting sensitive data into or out of University resources.
With nearly 7,000 wireless access points throughout campus, the University of Minnesota's WiFi networks are secure, reliable, and about 10 times faster than the average home network. Choose the most appropriate one to maximize performance of your device and ensure that your data is secure.
Tip of the Day
Two-step verification is one of the best steps you can take to secure any account. Two-step verification is when you require both a password and code sent to or generated by your mobile device. Examples of services that support two-step verification include Gmail, Dropbox and Twitter.
Phishing Scams Targeting the University
Beware of Email with Subject Line "University of Minnesota Staff and Student Notice"
An email that asks you to sign in to a legitimate-looking page with a Singapore URL is a scam.