February 17, 2023

Separate user and admin accounts

Are you using an account with administrative (admin) privileges to perform day-today work tasks? Many people do, but it is not a recommended practice. Here’s why: Adversaries can gain access to your computer through successful phishing attacks or if you unintentionally download malware from an infected website. If this happens while you are using an…


September 24, 2021

Returning to the UW Campuses

woman using laptop

Background   After 18 months of remote academics and work, UW returns to campus operations in a hybrid environment. Members of the UW community have spent a year telecommuting to their respective areas on the UW network. The University will now resume operations with a hybrid model in which staff  members have access at home and…


August 13, 2021

Public vs. private: Social media

social media icons

This week in the public vs. private series we are considering security measures to keep data private on social media applications. As a part of their Telework and Mobile Security Guidance, the National Security Agency and Central Security Service has published a list of best practices for keeping safe on social media. Their guidance includes…


July 30, 2021

Public vs private: Wireless encryption

WiFi signal

This week in the public vs. private series we will cover what to do to keep your personal and UW data private, particularly while you’re in a public place. In order to protect your data, it is good to understand two “states” of data: Data at rest Data in transit Data stored on computers, laptops,…


June 25, 2021

File sharing permissions

When you collaborate and share information using UW-provided productivity platforms such as Office 365 or Google Drive, it’s important to ensure that you’re sharing only with people who should have access to files and folders on your individual and team drives. For each file or folder that you create, consider whether you would like the…


May 28, 2021

Managing Secrets

An important part of attending to information security risks and threats is managing various types of secrets, such as passwords, certificates, and keys. Our newly-published Managing Secrets Risk Advisory lists considerations and tools for securely accessing, sharing, storing, and changing your organization’s secrets, as well as things to avoid. Go to Advisory More Articles