Nearly all private information about us is stored behind a password and as a result, it is imperative you use a strong password. Password strength depends on a number of factors, such as how many characters it is and what type of characters (numbers, uppercase, lowercase, symbols) it uses.

Malware comes in many different shapes and sizes, ranging from annoying adware to ransomware which can hold your data hostage until you pay the thieves real money. Here you will find best practices to prevent malware infections and a rundown of the different types of malware.

Any attempt to trick a user into giving out their credentials (either willingly or unwillingly) is considered a phishing attack. UW-Milwaukee has been hit exceptionally hard recently with such attacks. Learn how to spot a phishing email so you can save yourself a lot of time and hassle!

Identity and Access Management
Identity and access management services are an important set of tools that enable personalized access to resources while still protecting the identity and personal information for members of the UWM campus community.

Mobile Device Guidelines
Since cybercriminals usually cast wide nets to reach more potential victims, mobile users should protect their devices early on to defend against threats.



Listed below are links to outside resources regarding computer security and virus protection. We welcome suggestions for additional links, contact us!