Computer Security

Protect Yourself and Your Devices 

When you registered your computer/laptop/pad/tablet/phone in BlueZone to connect to the USU network, you gained access to the abundance of information and services on the internet.  You have also exposed your computer to the mischief and hazards that abound on the internet.  You are your own first line of defense against those ills. You should follow the 8 Steps to Protect Your Computer provided by the IT ServiceDesk and learn here how to be an Internet Skeptic. When your defensive efforts fail, the IT Security Team may be your second line of defense.

Preview our new Security Training Module (hosted at Qualtrics.com).

Contact

Phone: 797-1804

Email:
security@usu.edu

Location: SER 301 view map

Internet Skeptic Blog

Stay informed on how to keep your computer, devices, and cyber identity secure.

OWA Helps You Avoid Hoax Sites

OWA Helps You Avoid Hoax Sites

Our OWA login page has a little reminder to help you get in the habit of checking the web address so you aren't fooled by a hoax site.

Can A Picture Contain Malware?

Can A Picture Contain Malware?

Well, no, but sort of.

Computer Security Threats

Heartbleed Bug and Password Managers

Heartbleed Bug and Password Managers

The OpenSSL/Heartbleed bug has been in the news and at USU as well. We have protected our central systems; you should update all of your passwords and take the opportunity to start using a Password Manager.