Print & Post
Print and post these IT security posters (8½x11 inch PDFs) to help your colleagues, friends, and others you care about protect themselves and the university from IT security threats.
- Anti-Phishing Posters and Tip Sheets in English, Mandarin, and Spanish. Printable posters and tip sheets in three languages to inform people of ways to spot and report phishing attempts.
- "Are you there" scam. Did you just get an urgent request for money from your boss? Stop and check. It could be a forged email from a scammer.
- Beware of Ransomware! Tips for avoiding being hit by ransomeware and how to what to do if you are.
- Don't Fall for Tax Fraud. Tips for preventing tax fraud, spotting tax-related scams, and where to get more information and assistance.
- Lock Your Screen When You Leave. Protect yourself and U-M by locking workstations, laptops, and devices when they are not in use.
- Michigan Medicine IT Cyber Safety – Review In 2. Posters from Michigan Medicine's monthly series.
- Protect Your U-M Account. Check links in email before clicking, don't open suspicious attachments or shared docs, and look before you log in.
- Report Phishing & Email Scams. Use ReportPhish@umich.edu to report phishing and suspicious email to IT security staff.
- Secure Your Password. Tips for creating a strong UMICH (Level-1) password and protecting it.
- Security Privacy Interaction Lab (spilab) at the School of Information. Printable posters and tip sheets to help you secure your privacy online.
- Shop Online Safely. Tips for making your online shopping experience safer.
- Tech Support Scams. Don't be fooled by fake tech support claims in phone calls and web pop-ups.
- Traveling with Duo. Duo offers many options for use while traveling. With a little planning, you can have a smooth, and more cybersecure, trip.
- Travel with Tech. Protect your security and privacy, as well as sensitive U-M data, when you travel with technology.
- U-M Data Classification Levels. U-M uses four data classification levels: Restricted, High, Moderate, and Low. The goal of data classification policy is to allow users to identify, understand, better manage, and employ an appropriate level of security for university-owned data.
- Use a Passcode or PIN for Your Mobile Devices. Always secure your mobile devices with either a password, passcode, PIN, pattern, or fingerprint. It is one of the most important ways to protect the information that is accessible from your devices.
- What to Do if Your U-M Account is Compromised. If you think your U-M account might be compromised, you should take action immediately.
Digital sign versions of most of the posters above are available to the U-M community in a U-M Box folder: Safe Computing - Security Tips (Digital Signs) (U-M login required).
Information Assurance provides 4¼x3½ inch printed brochures for distribution to faculty and staff in U-M units. To request copies of a brochure, send email to firstname.lastname@example.org.
- Device Security Guide. Provides information on securing personally owned devices in support of Security of Personally Owned Devices that Access or Maintain Sensitive Institutional Data (SPG 601.33).
- Device Security for Students. Provides suggestions on the settings, connections, and management of devices, as well as general safe computing tips.
- Ransomware. Provides information on ransomware, malicious software that encrypts files and hold them for ransom.
- Turn On Two-Factor for Weblogin. Describes how to turn on Duo two-factor authentication for U-M Weblogin.
- Using Duo While Traveling Abroad. Describes Duo two-factor options that can be used while traveling, including the Duo Mobile smartphone app for offline passcodes, hardware tokens, and bypass codes.