Print & Post
Print and post these IT security posters (8-1/2 by 11 inches; PDFs) to help your colleagues, friends, and others you care about protect themselves and the university from IT security threats.
- Don't Fall for Tax Fraud. Tips for preventing tax fraud, spotting tax-related scams, and where to get more information and assistance.
- Lock Your Screen When You Leave. Protect yourself and U-M by locking workstations, laptops, and devices when they are not in use.
- Protect Your U-M Account. Check links in email before clicking, don't open suspicious attachments or shared docs, and look before you log in.
- Report Phishing & Email Scams. Use ReportPhish@umich.edu to report phishing and suspicious email to IT security staff.
- Shop Online Safely. Tips for making your online shopping experience safer.
- Tech Support Scams. Don't be fooled by fake tech support claims in phone calls and web pop-ups.
- Turn On Two-Factor for Weblogin. Your password needs a partner. Turn on two-factor authentication for Weblogin for an extra layer of security for your personal information at U-M.
- U-M Data Classification Levels. U-M uses four data classification levels: Restricted, High, Moderate, and Low. The goal of data classification policy is to allow users to identify, understand, better manage, and employ an appropriate level of security for university-owned data.
- Use a Passcode or PIN for Your Mobile Devices. Always secure your mobile devices with either a password, passcode, PIN, pattern, or fingerprint. It is one of the most important ways to protect the information that is accessible from your devices.
- What to Do if Your U-M Account is Compromised. If you think your U-M account might be compromised, you should take action immediately.
Digital sign versions of most of the posters above are available to the U-M community in a U-M Box folder: Safe Computing - Security Tips (Digital Signs).
Information Assurance provides 4-1/4 X 3-1/2 inch printed brochures for distribution to faculty and staff in U-M units. To request copies of a brochure, send email to firstname.lastname@example.org.
- Device Security Guide. Provides information on securing personally owned devices in support of Security of Personally Owned Devices that Access or Maintain Sensitive Institutional Data (SPG 601.33).
- Ransomware. Provides information on ransomware, malicious software that encrypts files and hold them for ransom.
- Turn on Two-Factor for Weblogin. Describes what two-factor authentication is, why you should use it, what to expect, and how to turn it on for Weblogin.
Request "YOU Are Our Best Defense" Posters
Michigan IT Symposium Posters
- Change by the Numbers: Implementing Cloud-Based Duo at U-M
- Using Michigan Intelligence to Negate IT Security Threats
- Vendor Security Risk Management at Michigan Medicine