Site Map | Faculty Intranet | Staff Intranet | Student Intranet |

ME-IT Security

You are here

Safe Computing and Data

A cyber attack may come in a variety of different forms, but often the intent is malicious - such as an intrusion seeking to access or steal intellectual, proprietary or personal information, or an attempt to bring down a computer system or web site.

Criminals can use spam, phishing, and other malicious email to gain access to your personal and financial information, as well as sensitive university information and access to U-M resources. For example, criminals often send emails that look like they are from a U-M email, to try to trick you to click on a link or reply to their message - to reveal your password or other information.

If you unsure if an email is from a legitimate sender, contact, review the U-M Safe Computing information web site or ITS 4Help. You can report Report U-M phishes that appear to come from U-M addresses (by forwarding the entire message with full original headers to The email sender cannot be identified without the full original headers (link to detailed instructions on how to report phishing under "Test yourself and take action").

Safe Computing Resources - Emails

Phishing Information & Video

Phishing Protect Yourself

U-M IIA Phishing Examples

Safe Computing Resources - Security Alerts

• U-M IIA All Alerts University of Michigan Safe Computing website Alerts.

Safe Computing Resources - Data

• Make informed decisions about where to safely store and share sensitive dataSensitive Data Guide University of Michigan Safe Computing website Sensitive Data Guide - by Service or Data Type.

Safe Computing Resources - Passwords

• U-M Password Checklist Link.

• U-M Change Your Password Link.

• U-M Choosing a Secure Password Link.