One tip for better IT security this summer

This information was sent via email to students at UM-Ann Arbor and Michigan Medicine on April 18, 2019.

Whatever your summer plans, keep your technology and accounts secure and private with this one tip: Use two-factor authentication wherever you can. Think of it as a way of double-checking your identity when you log in to an app or online service.

Two-Factor for your U-M account

U-M uses Duo for two-factor. Protect your information, including information concerning direct deposit and email, by turning on two-factor for your U-M account today.

Myth:
You have to two-factor in every time you want to access your account.

Fact:
Duo lets you bypass the two-factor prompt for seven days when using Weblogin (using the same device and web browser). Check the Remember me for 7 days box at the bottom of the window next time you log in with Duo.

Two-Factor for your personal accounts

Your personal accounts need protection, too. Check whether your personal accounts (email services, financial institutions, and social media providers) have two-factor. Turning it on keeps your information secure, even if your password is stolen. If you already use the Duo Mobile app for two-factor authentication at U-M, you might also be able to use it with your personal non-university accounts.

Myth:
You can’t use two-factor without WiFi or a cellular connection.

Fact:
You don't need WiFi or cellular connectivity to use the Duo app on your phone or tablet. It can generate passcodes for login even when your device is in airplane mode.

Still unsure? Duo offers additional options to help you travel with two-factor.

Your IT security and privacy resource

Safe Computing offers tips and recommendations for avoiding scams and phishing, protecting your privacy, securing your personal devices, and more. It also includes security alerts and links to the latest IT security and privacy news. You can share these resources with your family and friends, and follow us on Twitter for up-to-date news about technology and security.

Also, if you're looking for a good book to read on a sunny (or rainy) day, or on a long trip, we listed a few of our favorites that are focused on privacy in the digital age below. We'd love to hear your thoughts.

Have a great summer!

Sincerely,

Ravi Pendse, Ph.D.
Vice President for Information Technology and Chief Information Officer
University of Michigan

Sol Bermann
Interim Chief Information Security Officer and Chief Privacy Officer
University of Michigan

 
Summer reading: Technology and privacy edition

  • Chasing Shadows: Visions of Our Coming Transparent World (David Brin and Stephen W. Potts, editors)
    A collection of short stories and essays by science fiction luminaries that examine the benefits and pitfalls of technological transparency in all its permutations. Has Orwell's Big Brother finally arrived?
  • The Circle (by Dave Eggers)
    This dystopian novel imagines a world influenced and controlled by a fictional mash-up of Google and Facebook, a world where "secrets are lies," "sharing is caring," and "privacy is theft."
  • Dragnet Nation (by Julia Angwin)
    In a world where we can be watched in our own homes, impersonated, financially manipulated, or even placed in a police lineup, the author argues that the greatest long-term danger is when we internalize the surveillance and censor our own words and thoughts.
  • Privacy in the Modern Age (Marc Rotenberg, Julia Horwitz, and Jeramie Scott, editors)
    A review of privacy problems accompanied by proposed solutions. Contributors to this anthology take a close look at business practices, public policy, and technology design and ask, "Should this continue? Is there a better approach?"
Date Sent: 
Thursday, April 18, 2019