Follow these tips, adapted from tips to protect your personal information when shopping online.
Safe Computing Home
Information Security Requirements
Comply with U-M information security policy and supplemental standards.
Sensitive Data Guide
Decide where to safely store and share sensitive data using U-M IT services.
In the News
12/14/2018 – Government Technology
12/13/2018 – Bloomberg
12/12/2018 – Bloomberg
Tips & Videos
Scammers impersonate tech support—through pop-ups and phone calls—and claim to know that something is wrong with your computer. Don't give them access or money.