Protect yourself from phishing scams
Phishing scams are on the rise. Learn to spot the signs of a phishing attempt and how to report suspicious emails.
Phishing scams are on the rise. Learn to spot the signs of a phishing attempt and how to report suspicious emails.
Active work is focused on piloting device compliance notifications, moving forward with Elastic Cloud migration and hosting office hours.
The scammer starts by asking to discuss your work. Then, once a relationship is established, they try to convince you to “invest” or transfer money. Learn what these scams look like — and what to do if you are targeted.
Keeping track of passwords doesn’t have to be a chore. 1Password can help you lasso your current passwords and generate new ones — allowing you time to do things besides banging your head on your keyboard.
Smart Access is moving from evaluation to execution with two initial priorities for 2026: device compliance and log management.
Earlier this year, Smart Access began reviewing VPN device data to better understand the security posture of devices connecting to university resources. This article builds on our January update, which outlined our visibility-first approach.
Smart Access work is active, focused on advancing Zero Trust with the tools we already have. Learn more about the current work and what’s next.
Smart Access is focused on improving visibility and enabling data-informed decisions. In this article, the team shares the progress of their current work.
Artificial intelligence tools can help you work smarter—drafting emails, summarizing documents, brainstorming ideas. But when you’re working with university data, choosing the right AI tool matters.
Artificial intelligence tools can help you work smarter: drafting emails, summarizing documents, brainstorming ideas. But choosing the right AI tool matters. Here’s what you need to know to use AI responsibly at UW–Madison.