Print and post these IT security posters (8-1/2 by 11 inches; PDFs) to help your colleagues, friends, and others you care about protect themselves and the university from IT security threats.
- Don't Fall for Tax Fraud. Tips for preventing tax fraud, spotting tax-related scams, and where to get more information and assistance.
- Lock Your Screen When You Leave. Protect yourself and U-M by locking workstations, laptops, and devices when they are not in use.
- Protect Your U-M Account. Check links in email before clicking, don't open suspicious attachments or shared docs, and look before you log in.
- Shop Online Safely. Tips for making your online shopping experience safer.
- Tech Support Scams. Don't be fooled by fake tech support claims in phone calls and web pop-ups.
- Turn On Two-Factor for Weblogin. Your password needs a partner. Turn on two-factor authentication for Weblogin for an extra layer of security for your personal information at U-M.
- U-M Data Classification Levels. U-M uses four data classification levels: Restricted, High, Moderate, and Low. The goal of data classification policy is to allow users to identify, understand, better manage, and employ an appropriate level of security for university-owned data.
- Use a Passcode or PIN for Your Mobile Devices. Always secure your mobile devices with either a password, passcode, PIN, pattern, or fingerprint. It is one of the most important ways to protect the information that is accessible from your devices.
- What to Do if Your U-M Account is Compromised. If you think your U-M account might be compromised, you should take action immediately.
Digital sign versions of most of the posters above are available to the U-M community in a Box at U-M folder: Safe Computing - Security Tips (Digital Signs).
Information Assurance provides handy 4-1/4 X 3-1/2 inch printed brochures for distribution to faculty and staff in U-M units. To request copies of a brochure, send email to email@example.com
- Device Security Guide. Provides information on securing personally owned devices in support of Security of Personally Owned Devices that Access or Maintain Sensitive Institutional Data (SPG 601.33).
- Ransomware. Provides information on ransomware, malicious software that encrypts files and hold them for ransom.
- Turn on Two-Factor for Weblogin. Describes what two-factor authentication is, why you should use it, what to expect, and how to turn it on for Weblogin.
Michigan IT Symposium Posters
These posters were presented at the 2016 Michigan IT Symposium: