Identity, Privacy and Cybersecurity

Privacy

Learn about how personal data is collected, stored, managed, shared, and the choices you have regarding your data.

Identity and Access

Learn about your different campus roles, and about access to applications, software and systems at the University of Illinois.

Cybersecurity

Learn about ways the University of Illinois protects individuals, networks, data, devices and the role that you play.

Be wary and watch for phishing

Please be aware of increased risk associated with phishing and social engineering. Never share your personal or account information. Remain vigilant and exercise caution when clicking links or opening/downloading attachments via email.  

What can you do?

These steps can help you stay ahead of phishing.

Think before you click. Be cautious with links in an email, text, or direct message. Scammers can fake familiar logos, senders’ names, and other information to try to entice you into clicking a malicious link. Instead, visit official websites by typing the site address into your browser or using a trusted bookmark.

Verify that attachments and cloud files are safe before opening or downloading, because these files can contain malware or ransomware. To make sure a cloud file or attachment is legitimate, contact the sender through a separate means of communication, such as a known, verified phone number.

Keep apps, software and operating systems updated. Updates often include patches that fix cybersecurity vulnerabilities. Safe options for updates include your device’s app store, the software’s built-in update features (found in the settings or help menu) or the WebStore.

Be cautious when interacting with CAPTCHAs, especially on unfamiliar websites or in unexpected contexts. The ClickFix technique sometimes uses fake CAPTCHA checks. Just like in real CAPTCHA checks, the user is asked to verify they are human. After that, though, the user is given additional verification steps that instruct them to copy and paste a hidden command. Legitimate services will never ask you to copy and paste hidden commands.

Avoid interacting with unexpected pop-up windows.  Try to close unexpected pop-up windows without clicking on the content inside. Consider using a pop-up blocker for additional protection. Check out the Answers KnowledgeBase Web Browsers – Popup Blockers support article for more information.


The Cybersecurity Improvement Initiative

Technology Services and our campus IT partners are embarking on a multi-year effort to increase protection for our people, resources and data.


Need a privacy review?

We can provide free consultative services.

If your university responsibilities include storing, capturing, or processing PII, you could benefit from a privacy review. A privacy review looks at projects that create or collect new PII or use existing personal information in a new way.


Risk assessments make good business sense

If you are unsure who can officially accept certain risks, what the applicable processes look like, who the data stewards for certain data types are or who the risk holder might be for an existing gap, GRC can help.

Privacy & Cybersecurity
Digital Computer Lab
1304 W. Springfield Ave.
Urbana, IL 61801
Email: securitysupport@illinois.edu
Log In