Practice Safe Computing
Learn how to keep your computers, mobile devices, and data safe, both at home and at the U.
All Services & Technologies
Incident Response for Information Security
Report suspected or discovered information security incidents to University Information Security. University Information Security will notify you of next steps.
Authentication Services
Endpoint Management
Request computer and device support including security patching, updates, and maintaining the general health of the devices.
Consultations on Information Security
Consult with information security professionals about security architecture, software acquisition, governance and compliance requirements (e.g., HIPAA, payment cards), business processes, and network design.
Cloud Storage Services
Secure, collaborative, and cloud based storage
Virtual Private Network (VPN)
Connect to the University's network when you are not on campus.
WiFi Network
Access the internet securely and reliably from almost anywhere in campus buildings.
Do-It-Yourself Resources
Good Practices
It is important that you familiarize yourself with the types of data entrusted to you, how you are accessing the data, and how you are storing the data. You are required to adhere to the University’s security policies,...
Learn how to protect yourself and the University against the loss or unauthorized disclosure of private data.
Good Practices
Phishing is a common scam tactic to trick you into revealing sensitive data by visiting a fraudulent website, opening an infected document, or logging in to "validate your email account."ChallengeA friend or colleague...
Find out how to recognize "phishing" scams that attempt to trick you into visiting fraudulent websites, opening infected documents, or logging in to “validate your email account.”
Good Practices
To keep your device current, enable automatic updates and install updates when notified.
Challenge
Older or unpatched software increases the likelihood that cyber criminals can exploit vulnerabilities in the...
Protect yourself against vulnerabilities in your devices by keeping them up-to-date.
Good Practices
A strong password or passphrase uses a combination of length and character types. Learn what to do and not to do to keep it safe. For extra protection, use two-factor authentication where available.ChallengeMany...
Protect yourself by choosing strong passwords.
Good Practices
Challenge
Older or unpatched software increases exposure to vulnerabilities in the operating system, application software, and apps that can allow attackers to control your system or steal your private data.
...Protect yourself by turning on security features on your devices.
Good Practices
Challenge
Backups are essential. Your hard drive could fail, you could lose your device, it could be stolen, or you could get a malware infection that takes your files hostage. You could lose your papers,...
Protect yourself from losing important information by backing up your data.
Good Practices
Challenge
You shop online, update student information, or a medical record, and need to enter private data (i.e., credit card number, birth date). Cybercriminals who monitor or intercept your online activities can...
Learn about ways that you can protect yourself by using your device securely.
Good Practices
Learn more about how to make your online experience safer and also help secure the University.ChallengeWe live in a world of ever-changing cybersecurity threats. What can you do to protect yourself and others?...
We live in a world of ever-changing cyber security threats. Learn more about how to make your online experience safer and also help secure the University.
Good Practices
Downloading or sharing software, entertainment, or images may violate United States copyright law. Many torrent applications default to continue sharing your downloads with other users. Learn how to distribute...
Learn how to use copyrighted materials legally.
Good Practices
Challenge
Identity theft can happen to anyone at any time. It can be hard to immediately tell if you are affected, or to know who to notify. Sometimes it is hard to know how or where it actually occurred, however,...
Learn what steps you need to take to recover from Identity Theft.
Good Practices
Challenge
How do you keep removable media and devices secure?
In our interconnected and cloud-enabled world, we tend not to focus on the tangible hardware that holds data. This includes removable media...
Learn about best practices for keeping removable media and devices secure.
Resources
Remind yourself and others about safe computing best practices by posting our handout.
Remind yourself and others about safe computing best practices by posting our handout.
Phishing Scams Targeting the University
Beware of Email With Subject Lines Like "University of Minnesota Staff and Student Notice"
An email that asks you to sign in to a legitimate-looking page with a suspicious URL is a scam.
Learn more about Phishing Scams Targeting the University.