Print & Post
Print and post these IT security posters (8-1/2 x 11 inch; PDFs) to help your colleagues, friends, and others you care about protect themselves and the university from IT security threats.
- Don't Fall for Tax Fraud. Tips for preventing tax fraud, spotting tax-related scams, and where to get more information and assistance.
- Lock Your Screen When You Leave. Protect yourself and U-M by locking workstations, laptops, and devices when they are not in use.
- Protect Your U-M Account. Check links in email before clicking, don't open suspicious attachments or shared docs, and look before you log in.
- Report Phishing & Email Scams. Use ReportPhish@umich.edu to report phishing and suspicious email to IT security staff.
- Shop Online Safely. Tips for making your online shopping experience safer.
- Tech Support Scams. Don't be fooled by fake tech support claims in phone calls and web pop-ups.
- Turn On Two-Factor for Weblogin. Your password needs a partner. Turn on two-factor authentication for Weblogin for an extra layer of security for your personal information at U-M.
- U-M Data Classification Levels. U-M uses four data classification levels: Restricted, High, Moderate, and Low. The goal of data classification policy is to allow users to identify, understand, better manage, and employ an appropriate level of security for university-owned data.
- Use a Passcode or PIN for Your Mobile Devices. Always secure your mobile devices with either a password, passcode, PIN, pattern, or fingerprint. It is one of the most important ways to protect the information that is accessible from your devices.
- What to Do if Your U-M Account is Compromised. If you think your U-M account might be compromised, you should take action immediately.
Digital sign versions of most of the posters above are available to the U-M community in a U-M Box folder: Safe Computing - Security Tips (Digital Signs).
Information Assurance provides 4.25 x 3.5 inch printed brochures for distribution to faculty and staff in U-M units. To request copies of a brochure, send email to email@example.com.
- Device Security Guide. Provides information on securing personally owned devices in support of Security of Personally Owned Devices that Access or Maintain Sensitive Institutional Data (SPG 601.33).
- Ransomware. Provides information on ransomware, malicious software that encrypts files and hold them for ransom.
- Turn on Two-Factor for Weblogin. Describes what two-factor authentication is, why you should use it, what to expect, and how to turn it on for Weblogin.
- Using Duo While Traveling Abroad. Describes Duo two-factor options that can be used while traveling, including the Duo Mobile smartphone app for offline passcodes, hardware tokens, and bypass codes.
Request "YOU Are Our Best Defense" Posters
Michigan IT Symposium Posters
- Change by the Numbers: Implementing Cloud-Based Duo at U-M
- Using Michigan Intelligence to Negate IT Security Threats
- Vendor Security Risk Management at Michigan Medicine