Practice Safe Computing
header image gradient


Practice Safe Computing

Learn how to keep your computers, mobile devices, and data safe, both at home and at the U.

Services & Technologies

Incident Response for Information Security

Report suspected or discovered information security incidents to University Information Security. University Information Security will notify you of next steps.

Authentication Services

University faculty, staff, and students can use Duo Two Factor Authentication to add an extra layer of security to their Direct Deposit and W2 information in MyU. University employees who work with enterprise systems (like CS PeopleSoft, EFS PeopleSoft, EDMS, the Data Warehouse, and Box) use Duo Two Factor Authentication to help secure their access to University data. Anyone with a University ID can now set up two-factor authentication for all University sign-in applications (e.g., University GMail, Google Drive).

Computer & Device Support & Maintenance

Request computer and device support including security patching, updates, and maintaining the general health of the devices.

Consultations on Information Security

Consult University Information Security when you have questions involving private data, the security of technology provided by a vendor, or how to protect payment card information.  Our staff also consults with University members on information security in architecture, software acquisition, governance and compliance requirements, business processes, and network design.

Secure Storage

Secure, collaborative, and cloud based storage for highly protected data including HIPAA data. 

Virtual Private Network (VPN)

Access the University network securely – even when you're not on campus – with the University Virtual Private Network (VPN). Use VPN when you are connected to a non-University guest WiFi networks, connecting to the University network from an off-campus Internet Service Provider, or transmitting sensitive data into or out of University resources.

WiFi Network

With nearly 7,000 wireless access points throughout campus, the University of Minnesota's WiFi networks are secure, reliable, and about 10 times faster than the average home network. Choose the most appropriate one to maximize performance of your device and ensure that your data is secure.

Tip of the Day

Two-Step Verification

Two-step verification is one of the best steps you can take to secure any account. Two-step verification is when you require both a password and code sent to or generated by your mobile device. Examples of services that support two-step verification include Gmail, Dropbox and Twitter.

To learn more, check out this OUCH! newsletter.

Read more security awareness Tips of the Day.

Phishing Scams Targeting the University

Beware of Email with Subject Line "University of Minnesota Staff and Student Notice"

fake sign in screen URL ends in .sg

An email that asks you to sign in to a legitimate-looking page with a Singapore URL is a scam.