January 16, 2019

Beware of phishing emails asking for W-2 information

Learn how to protect yourself from cybercriminals who try to steal an employee’s login credentials so that they can download Wage and Tax Statements (Form W-2). They then can use the W-2 information to electronically file a fraudulent federal income tax return in the employee’s name. By changing the bank account number, the cybercriminals receive the refund. Fortunately, your vigilance and Duo, the UW’s two-factor authentication system, can play a pivotal role in protecting employee data.

Read the full announcement

January 10, 2019

Top tech tips for students

girl is watching online video on tablet

We’ve got the tech just for you. Watch this video and learn the top 10 technology tips that can help you succeed at the UW.

January 7, 2019

Connect to UW network resources from off campus with Husky OnNet

Mobile phone with screenshot of Husky OnNet

Need to access files on the UW network from home? Use a UW secure virtual private network (VPN), like the free Husky OnNet for current students, faculty and staff. Off-campus access to UW resources on the UW network through remote desktop or a file-sharing application require a VPN. But web-based UW resources and services, such…

January 2, 2019

Check out IT resource guide for telecommuting

Woman enjoying coffee during work on portable laptop computer

If you’re affected by the State Route 99 Viaduct Closure beginning on Jan. 11 and planning to telecommute, check out this resource guide to IT services. UW-IT also recommends contacting your local IT support organization for guidance on best practices and resources for working remotely.

December 31, 2018

Provide secure access to departmental resources on the UW network

concept of safe connection showing padlock over a fast-moving city

Now offered to units at no cost, the Husky OnNet – Department (HON-D) service provides secure access to restricted resources on the UW network from on- or off-campus locations. With HON-D, authorized users connect to a designated departmental server with the same application as the Husky OnNet service. Authorized access is facilitated through a departmentally…

December 3, 2018

New app reduces spam phone calls at UW

black telephone receivers hanging over gray background

Most spam calls are now blocked before the phone even rings, thanks to a new spam-phone-call-blocking application developed and managed by UW Information Technology. Spam calls are coming into the UW at an unprecedented level, and they are disruptive and costly. The new app thwarts this deluge of junk calls, and other universities around the…

November 20, 2018

Cybersecurity team masters superhero tactics to defend network from hackers

Four students work on their computers at a Capture the Flag cyber warfare competition

Students on the UW’s cybersecurity team – Batman’s Kitchen – learn to protect a network against cyber criminals by thwarting their signature techniques. Batman’s Kitchen ranks number four in the nation among academic groups in competitions known as “Capture the Flag,” where teams engage in mock cyber warfare. Now, UW’s team is gearing up for…

October 31, 2018

Top 12 computing tips to stay safe online

screenshoot from video with data safe on a safe and little characters holding signs with the 12 computing tips

Take a look at this video of top 12 computing tips for protecting your personal information and UW’s institutional data.

October 29, 2018

Dispose of old computers and mobile devices securely with these resources

heap of old computers and old devices piled up

Learn how to delete data completely from computers and devices before you surplus or recycle them. Old desktops, laptops, and mobile and portable storage devices may contain UW information, such as personally identifiable information, cached login credentials, or other confidential data that can be compromised if the device is not securely disposed.

October 23, 2018

Protect confidential information sent by fax and multifunction machines

Photo of a multifunction copy machine with flying papers around it

Learn how copy, print and fax devices can be vulnerable to cybercriminals and best practices for protecting them. Multifunction copy, print and fax devices can retain confidential data, personally identifiable information and even protected health information. As these machines are subject to the same data security vulnerabilities as other computing technology, the Office of the…

Next Page »