Resources

Passwords

Nearly all private information about us is stored behind a password and as a result, it is imperative you use a strong password. Password strength depends on a number of factors, such as how many characters it is and what type of characters (numbers, uppercase, lowercase, symbols) it uses.

 

Malware

Malware comes in many different shapes and sizes, ranging from annoying adware to ransomware which can hold your data hostage until you pay the thieves real money. Here you will find best practices to prevent malware infections and a rundown of the different types of malware.

 

Phishing

Any attempt to trick a user into giving out their credentials (either willingly or unwillingly) is considered a phishing attack. UW-Milwaukee has been hit exceptionally hard recently with such attacks. Learn how to spot a phishing email so you can save yourself a lot of time and hassle!

 

Identity and Access Management
Identity and access management services are an important set of tools that enable personalized access to resources while still protecting the identity and personal information for members of the UWM campus community.

Articles & Publications

Links
Listed below are links to outside resources regarding computer security and virus protection. We welcome suggestions for additional links, so please email your suggestions to csirt@uwm.edu.