Practice Safe Computing
Services & Technologies
Incident Response for Information Security
Report suspected or discovered information security incidents to University Information Security. University Information Security is responsible for coordinating reports and responses for the University.
University faculty, staff, and students can use Duo Two Factor Authentication to add an extra layer of security to their Direct Deposit and W2 information in MyU. University employees who work with enterprise systems (like CS PeopleSoft, EFS PeopleSoft, EDMS, the Data Warehouse, and Box) use Duo Two Factor Authentication to help secure their access to University data. Anyone with a University ID can now set up two-factor authentication for all University sign-in applications (e.g., University GMail, Google Drive).
Computer & Device Support & Maintenance
Request computer and device support including security patching, updates, and maintaining the general health of the devices.
Consultations on Information Security
Consult University Information Security when you have questions involving private data, the security of technology provided by a vendor, or how to protect payment card information. Our staff also consults with University members on information security in architecture, software acquisition, governance and compliance requirements, business processes, and network design.
Storage Services for the University Community
Find the right storage solution for your data, documents, and media that best fits your needs for security, availability, and performance.
Virtual Private Network (VPN)
Access the University network securely – even when you're not on campus – with the University Virtual Private Network (VPN). Use VPN when you are connected to a non-University guest WiFi networks, connecting to the University network from an off-campus Internet Service Provider, or transmitting sensitive data into or out of University resources.
With nearly 7,000 wireless access points throughout campus, the University of Minnesota's WiFi networks are secure, reliable, and about 10 times faster than the average home network. Choose the most appropriate one to maximize performance of your device and ensure that your data is secure.
Tip of the Day
Two-step verification is one of the best steps you can take to secure any account. Two-step verification is when you require both a password and code sent to or generated by your mobile device. Examples of services that support two-step verification include Gmail, Dropbox and Twitter.
Phishing Scams Targeting the University
Beware of Email with Subject Line "University of Minnesota Staff and Student Notice"
An email that asks you to sign in to a legitimate-looking page with a Singapore URL is a scam.