Web cookies (also called HTTP cookies, browser cookies, or simply cookies) are small pieces of data that websites store on your device (computer, phone, etc.) through your web browser. They are used to remember information about you and your interactions with the site.| security.uconn.edu
Phishing scams are a daily threat experienced at UConn. If you receive an email that appears to be out of the ordinary, do not click on links, open attachments, or respond to the sender. How to report Please report suspicious emails by clicking Outlook’s “Report” button in the upper right-hand corner of the email. Your […]| IT Security
Tax season is upon us, making it an opportune time for scammers to attempt to defraud you. Cybercriminals frequently disguise themselves as Payroll offices/officials by sending emails that contain calls for action, such as requests for you to verify tax information, update direct deposit accounts, print and cash checks, and/or visit a website that is […]| IT Security
Users play a crucial role in defending against cybercriminals. When your password is stolen, a hacker will try to use it to gain unauthorized, criminal access to University protected systems and information. Duo serves as a second line of defense, but only with your help. Hackers will attempt to trick you into authenticating a login […]| IT Security
“Credential thieves” find ways to steal usernames and passwords all the time. Whether a thief tricks you into providing your login information, or they hack a system, once a bad actor has what they need, your information and entire systems are at risk. Duo, the multi-factor authentication application used at UConn, can stop a thief […]| IT Security
Have you received an unsolicited job offer? Cybercriminals target students promising jobs and compensation. Often sent via email, students are routinely offered fake employment opportunities that are designed to steal your money, or lead to other harmful consequences. Common signs of employment scams: An e-mail that states “Message sent from a system outside of UConn” […]| IT Security
1/12/23 – Recently, LastPass, a password manager, has been in the news due to a compromise they experienced in 2022. We have been closely watching the developing situation and are offering our guidance to the community based on currently available information. The data included in the breach included encrypted information, such as passwords and unencrypted […]| IT Security
11/19/21 – A phishing message is circulating that targets students. The sender impersonates a UConn person and unit and attempts to trick the reader into clicking the link (cli. If you click the link, you are taken to a fake Office 365 login page and asked to enter your UConn credentials. If you receive this […]| IT Security
11/8/2021 – UConn IT Security is reporting a spike in the number of gift card scam messages. In this type of targeted message, the senders impersonate someone that you know, like a supervisor or department head, and they ask you to buy gift cards on their behalf. Do not respond, and do not buy gift […]| IT Security
The ITS Information Security Office has updated and added IT security policies that reflect current best practices. Below is a summary of the revised and new policies. You can view all IT security policies by going to security.uconn.edu and clicking “Policies, Standards & Guidelines.” Revised Policies Acceptable Use: Faculty, staff, and students should only use […]| IT Security
Regular review and revision of policies is part of evolving a mature information security program that protects systems and data for both our community and ...| security.uconn.edu
Vulnerability Scanning Assesses computers, computer systems, networks, or applications for security weaknesses IT Risk Management Process used to identify, ...| security.uconn.edu
Introduction Definitions Roles and Responsibilities Incident Response Methodology Appendix A - Executive Response Team Appendix B - Guidelines for Incident ...| security.uconn.edu