Print & Post
Print and post these IT security posters (8½x11 inch PDFs) to help your colleagues, friends, and others you care about protect themselves and the university from IT security threats.
- Anti-Phishing Posters and Tip Sheets in English, Mandarin, and Spanish. Printable posters and tip sheets in three languages to inform people of ways to spot and report phishing attempts.
- "Are you there" scam. Did you just get an urgent request for money from your boss? Stop and check. It could be a forged email from a scammer.
- Beware of Ransomware! Tips for avoiding being hit by ransomeware and how to what to do if you are.
- Don't Fall for Tax Fraud. Tips for preventing tax fraud, spotting tax-related scams, and where to get more information and assistance.
- Lock Your Screen When You Leave. Protect yourself and U-M by locking workstations, laptops, and devices when they are not in use.
- Michigan Medicine IT Cyber Safety – Review In 2. Posters from Michigan Medicine's monthly series.
- Protect Your U-M Account. Check links in email before clicking, don't open suspicious attachments or shared docs, and look before you log in.
- Report Phishing & Email Scams. Use ReportPhish@umich.edu to report phishing and suspicious email to IT security staff.
- Secure Your Password. Tips for creating a strong UMICH (Level-1) password and protecting it.
- Security Privacy Interaction Lab (spilab) at the School of Information. Printable posters and tip sheets to help you secure your privacy online.
- Shop Online Safely. Tips for making your online shopping experience safer.
- Tech Support Scams. Don't be fooled by fake tech support claims in phone calls and web pop-ups.
- Traveling with Duo. Duo offers many options for use while traveling. With a little planning, you can have a smooth, and more cybersecure, trip.
- U-M Data Classification Levels. U-M uses four data classification levels: Restricted, High, Moderate, and Low. The goal of data classification policy is to allow users to identify, understand, better manage, and employ an appropriate level of security for university-owned data.
- Use a Passcode or PIN for Your Mobile Devices. Always secure your mobile devices with either a password, passcode, PIN, pattern, or fingerprint. It is one of the most important ways to protect the information that is accessible from your devices.
- What to Do if Your U-M Account is Compromised. If you think your U-M account might be compromised, you should take action immediately.
Digital sign versions of most of the posters above are available to the U-M community in a U-M Box folder: Safe Computing - Security Tips (Digital Signs) (U-M login required).
Information Assurance provides 4¼x3½ inch printed brochures for distribution to faculty and staff in U-M units. To request copies of a brochure, send email to email@example.com.
- Device Security Guide. Provides information on securing personally owned devices in support of Security of Personally Owned Devices that Access or Maintain Sensitive Institutional Data (SPG 601.33).
- Device Security for Students. Provides suggestions on the settings, connections, and management of devices, as well as general safe computing tips.
- Ransomware. Provides information on ransomware, malicious software that encrypts files and hold them for ransom.
- Turn On Two-Factor for Weblogin. Describes how to turn on Duo two-factor authentication for U-M Weblogin.
- Using Duo While Traveling Abroad. Describes Duo two-factor options that can be used while traveling, including the Duo Mobile smartphone app for offline passcodes, hardware tokens, and bypass codes.
Request "YOU Are Our Best Defense" Posters
Michigan IT Symposium Posters
- Change by the Numbers: Implementing Cloud-Based Duo at U-M
- Using Michigan Intelligence to Negate IT Security Threats
- Vendor Security Risk Management at Michigan Medicine