Safe Computing Home

Information Security Requirements

Comply with U-M information security policy and supplemental standards.

Sensitive Data Guide

Decide where to safely store and share sensitive data using U-M IT services.

Phishing Alerts

Security Alerts

In the News

Tips & Videos

  • Scammers impersonate tech support—through pop-ups and phone calls—and claim to know that something is wrong with your computer. Don't give them access or money.
  • Two-factor authentication provides additional security for your personal accounts. Use it whenever it is offered.