Transcript and Links to Resources
Because you're part of the University of Michigan community, you're provided with access to computing resources. And sometimes to very sensitive data. You share in the responsibility to keep those resources secure and the data confidential.
Criminals and other threat actors are targeting us. They send phishing emails and engage in other scams. Their goal is to get access to U-M resources for their own malicious purposes. They might try to steal sensitive information or disrupt university operations via ransomware and more.
While IT security professionals take the lead in defending U-M, they can't do it all on their own. We all have an important role to play—a shared responsibility. You can do your part by following common sense and expert advice.
- For example, even though we use Duo two-factor, it's important to choose a strong password and don't reuse it anywhere else.
- Learn to recognize phishing emails and common scams so you can avoid them.
- Make sure all devices you use for work or your personal life are appropriately secured. Your work computer is often secured for you, but be sure to secure your own computer, tablet, and phone. Do that by turning on security settings and keeping your software updated. Your unit or department may have additional requirements that you must meet if you use your devices for university work.
- Be mindful about privacy, confidentiality, and compliance. There are a number of laws that ask us to be especially careful when working with certain kinds of sensitive data. Don't access or share information unless you have a business need to do so. and then make sure you are sharing it using appropriate tools and technologies.
- Threat actors never give up and they're always trying something new. Keep up with the latest and get answers to your questions at the Safe Computing website. That's safecomputing.umich.edu.
Thank you for all you do to protect the U. The bonus is that it helps protect you too.