UVM's Information Security Operations Team answers "Why?" Why?security

Income Tax Fraud: How to Protect Yourself

Nationwide, many taxpayers have attempted to file their federal and state income tax returns, only to find out that criminals have already filed fraudulent returns and claimed refunds.  The Vermont Department of Taxes explains:   Refund fraud occurs when a criminal uses stolen identification of a taxpayer, including Social Security Number, to create a phony return.  Often the criminal …

Passphrases and multifactor authentication

IT Colleagues, If you find yourself challenged to help those whose IT needs you support understand the importance of strong passwords, how to choose one, or why to use unique passwords, this month’s OUCH! newsletter may be useful.  You can download it from securingthehuman.org [1]. The newsletter also covers two-step verification or multi-factor authentication (MFA) …

The time for Encryption and Workstation Management is Now

IT Colleagues, Protecting the huge variety of information the University collects and manages is everyone’s responsibility.  For those of us with IT roles, people whose IT needs we support look to us to provide safe and secure ways to manage information.  The need is particularly critical when it comes to protecting personal and private information …

Visiting Questionable Websites (or, Using Your “Internet Hazmat Suit”)

National Cybersecurity Awareness Month is an annual opportunity for folks like us to encourage folks like you to adopt a simple, three-point approach to keeping yourself and your information safe online: STOP. THINK. CONNECT? With each phishing campaign that’s conducted against UVM’s students, faculty, and staff, the Information Security Office receives dozens of notifications from astute members of …

Physical Information Security for Everyone

National Cybersecurity Awareness Month is an annual opportunity for folks like us to encourage folks like you to adopt a simple, three-point approach to keeping yourself and your information safe online: STOP. THINK. CONNECT? As weird as it might seem, there are physical aspects to securing information about you: Before your data are stolen or corrupted, there’s a need …

Traveling Abroad without Making the News (Mobile Tech Edition)

Occasionally, a member of the community approaches the ISO Team to ask for our advice on traveling safely with mobile technology. While individual circumstances (including the nature of the mobile technologies/data in play, the nature of the trip, the particular destination) will dictate specifics, our general recommendations (below) will cover a lot of ground for …

Skip to toolbar