Server Towers

Who is IT Security

The information security office provides vital tools to assist Utah valley university Faculty, Staff and Students in safeguarding their private information and securing network resources against possible cybersecurity threats.

Meet The Team

LeRoy Brown

Officer - Security / IT Services

Shane Peterson

Officer - Banner Security

Dave Nielsen

Senior Analyst - IT Security

Jon Barclay

Senior Analyst - PCI Security

Daniel Dayley

Systems Specialist - IT Security

How To

Virtual Private Network (VPN) Access


Anti-Virus Software


Top Ten Security Measures

Use a strong password

Use e-mail wisely

Use anti-virus and anti-spyware software

  • Allow anti-virus and anti-spyware to automatically update so you will be protected against the latest threats as soon as patches become available.

Be cautious online

  • Look for "https" at the beginning of a website before you enter any personal information.  The "s" on "http" means the site is using SSL to encrypt your data before sending it across the web.
  • Be wary of downloading free software from the internet as it may often contain spyware, viruses, or other malware.
  • Be wary of popups which pretend to be security notifications from your computer.  Malicious websites often trick users into downloading their malicious software by pretending the download is necessary to protect the computer.  Exit your browser by holding down the Alt and F4 keys to close your browser instead of clicking to close the popup.

Use firewalls

Install OS and application updates

  • It is important to keep all software updated, not just your security software.  This is because vulnerabilities are constantly being found and exploited in much of the software we regularly use.  If you do not update the software you will not receive the patch to protect you from the vulnerabilities that have been discovered.
  • Software you should regularly update includes, but is not limited to; OS, Web Browsers, Plugins, Security Software, Java, Flash, Applications, etc.

Watch for signs of attack

  • If your computer is compromised it may run slowly, lock up, stop responding, lock up often, or crash and restart frequently.
  • You may notice your antivirus icon is gone from your system tray.
  • You may encounter pop-ups that you cannot close or persistent prompts telling you that you have been infected.
  • Contact your area technician or the Service Desk at x8888 if you suspect that your computer is infected.

Do not enter confidential information in an insecure manner

  • Public computers may already be compromised with malicious software such as key loggers which can record keystrokes to obtain your login information.
  • Using an unsecured or unknown source of wifi such as "free public wifi" can open you up to attackers who can listen to your internet traffic and obtain your login information.
  • Be wary of "shoulder surfers" who may simply look over your shoulder to obtain confidential information from you.

Ensure the physical security of your computer

  • If a hacker can physically gain access to your computer, they are far more likely to successfully steal information from it.
  • Lock your office when you step away and question anyone who gains access to your office without your permission.
  • Use a screen saver with a password and always lock your computer even if you are only stepping away for a moment. 

Handle sensitive data properly

  • The best way to protect sensitive data on your computer is to not have it there at all.
  • If it must be there, it is important to encrypt the data.
  • Private Sensitive Information Policy


  • No items loaded
  • SANS Tip Of The Day

  • No items loaded