Keeping you cyber-safe at UNMC – part 1 of 4

Editor’s Note: The U.S. Department of Homeland Security and the National Cyber Security Alliance have declared October as National Cyber Security Awareness Month. With the onslaught of new online threats such as identity theft and spyware, engaging in safe online behavior is crucial. Computers are used in virtually every aspect of our lives so it’s important to understand the risks, as well as the necessary steps to protect ourselves and our information online. This month, UNMC’s Information Technology Services (ITS) will be featuring several articles on identity theft, computer scams, Internet safety for children and how to keep your computer secure.


The challenges faced in the post-Sept. 11 world know no geographic bounds. As a result, UNMC Information Technology Services says it’s imperative that employees share information and knowledge to protect the organization’s information resources.

UNMC’s Information Technology Services (ITS) follows the best industry practices available to protect network vulnerability and regularly evaluates new security products for implementation, said Sharon Welna, associate director of ITS. The department daily monitors all network security recommendations from the Department of Homeland Security and others, and has implemented an encrypted e-mail solution to protect sensitive patient information. In addition, ITS provides anti-virus software for every computer and Microsoft offers automatic security updates for personal computers once a month.

However, Welna said each individual must be individually responsible for his or her behaviors and actions. ITS offers these basic tips to protect your campus workstation and the computer network:


  • Reboot your computer regularly to ensure the security updates are installed. Rebooting is like locking the door. If you don’t lock your door, it doesn’t make any difference.
  • Use caution when opening e-mail attachments. Only open those from known organizations. It is very common for computer viruses to be spread via e-mail and they can be very damaging to your workstation.
  • Use strong passwords to include numbers AND letters AND special characters and change them regularly.
  • Familiarize yourself with security and privacy policies and procedures.

Security is only as good as the weakest link and everyone must do his or her part to help, Welna said. “Security is not a project – it’s a process,” she said.

Employees suspecting either privacy or security violations should contact Sheila Wrobel, privacy officer, or Sharon Welna, security officer.

For more information on privacy and security visit, the ITS Web Site.

nmNC Fdsp QZQcuT