Practice Safe Computing
header image gradient

Title

Practice Safe Computing

Learn how to keep your computers, mobile devices, and data safe, both at home and at the U.

Services & Technologies

Incident Response for Information Security

Report suspected or discovered information security incidents to University Information Security. University Information Security will notify you of next steps.

Authentication Services

Current students, faculty, and staff are required to use Duo Security (two-factor authentication) at the University of Minnesota Sign-in page. Duo Security adds a layer of protection by requiring you to verify your identity with two factors: something you know (your password) and something you have (your device). Duo enables you to deny access to your accounts if someone is trying to sign in as you.

Computer & Device Support & Maintenance

Request computer and device support including security patching, updates, and maintaining the general health of the devices.

Consultations on Information Security

Consult University Information Security when you have questions involving private data, the security of technology provided by a vendor, or how to protect payment card information.  Our staff also consults with University members on information security in architecture, software acquisition, governance and compliance requirements, business processes, and network design.

Secure Storage

Secure, collaborative, and cloud based storage for highly protected data including HIPAA data. 

Virtual Private Network (VPN)

Access the University network securely – even when you're not on campus – with the University Virtual Private Network (VPN). Use VPN when you are connected to a non-University guest WiFi networks, connecting to the University network from an off-campus Internet Service Provider, or transmitting sensitive data into or out of University resources.

WiFi Network

With nearly 7,000 wireless access points throughout campus, the University of Minnesota's WiFi networks are secure, reliable, and about 10 times faster than the average home network. Choose the most appropriate one to maximize performance of your device and ensure that your data is secure.

Tip of the Day

Two-Step Verification

Two-step verification is one of the best steps you can take to secure any account. Two-step verification is when you require both a password and code sent to or generated by your mobile device. Examples of services that support two-step verification include Gmail, Dropbox and Twitter.

To learn more, check out this OUCH! newsletter.

Read more security awareness Tips of the Day.

Phishing Scams Targeting the University

Beware of Email with Subject Line "University of Minnesota Staff and Student Notice"

fake sign in screen URL ends in .sg

An email that asks you to sign in to a legitimate-looking page with a Singapore URL is a scam.