Privacy and Information Security | University of Illinois

CITES Security Blog

Background Check SPAM Email

A message claiming to be part of a background check is a spam message that can be safely deleted.

Unwanted Email

Email serves many purposes: we use it at work and in our personal lives to communicate and complete the tasks we need to. Though it’s only 40 years old (and didn’t gain popularity until the early 1990s) it’s hard to imagine life without it.

Windows Server 2003 Retirement

Microsoft is ending support for Windows Server 2003 on July 14, 2015. Afterward this date, Microsoft will no longer support, update, or patch Windows Server 2003 (including Server 2003 R2). To maintain a supported and secure computing environment, and to comply with the campus server standard, please retire or upgrade all Windows Server 2003 installations.

Microsoft Outlook for iOS and Android Apps

Microsoft released a new Outlook app for iOS and Android devices, but it's not good news for your security and privacy.

Safer Web Browsing

CITES and the Office of Privacy and Information Assurance (OPIA) will soon utilize a new method to help protect people on campus from online attacks. Beginning December 18, 2014, anyone using the campus network will be prevented from visiting web pages that are known to be malicious.

Specifically, when someone using the campus network clicks on a link attempting to visit a web page that is known to be malicious, the individual will be redirected to a notification page which explains why they were blocked from visiting the page.

Week 4: Protect Your Credentials, Protect Yourself

Your credentials identify you to computers and services. If someone logs in with your credentials they can pretend to be you and take any action as you. It's important to protect your credentials to protect yourself.

Week 3: Think of what you store and where it lives

Learning to protect your information is a vital skill in today's world. Whether it's your tax returns or your selfies, leaving data in the wrong place puts it at risk and can leave you open to identity theft. Data loss often occurs not because of "hacking", but because data was stored in an insecure location.

Week 2: Don't Be a Phishing Victim

Increasingly, hackers look beyond computers to gain access to computers and information. The strength of security is only as strong as the weakest link. Don't let yourself be the weakest link.

Week 1: Secure Your Devices

Securing your computing devices will help protect your information. Learn some easy steps you can take to be secure.

Information Security and the Email Footprint Challenge

The Office of Privacy and Information Assurance encourages members of the University of Illinois to take part in the Email Footprint Challenge to better protect data.

Pages