Information Technology Services

IT Security

To help protect the information assets of the university, ITS provides security solutions for the network, endpoints, cloud and UW-Whitewater applications. ITS also promotes security awareness education and provides best practices to help protect the university and your personal information.

To report an IT security incident or concern, like lost or stolen devices, ransomware, compromised accounts, and data breaches, contact the Help Desk.




IT Security Features

  • Network authentication system to help prevent network threats that includes posture checking and authentication.
  • Secure VPN connections for off-campus network access.
  • Spam filter that removes the vast majority of phishing and malicious emails before they reach your mailbox.
  • Cisco Umbrella acts as a filter protecting faculty, students and staff from malicious websites.

Getting Started with IT Security


The best way to combat malicious emails is to report them so they can be blocked from the campus email server and reported to appropriate watchdog agencies. Using the method below helps retain forensic information used to combat phishing and other types of malicious emails. If you are unable report suspicious emails using the methods described below, you can also forward the message to:

If you accidentally click on a link of a suspicious email or share your credentials, immediately contact the Help Desk. In the event that your email account is compromised, ITS will reset your password and freeze outgoing email functionality in order to protect other users. Once your account is cleaned up by ITS, there may be up to a two business day wait for outgoing email access to be restored. You will be required to take supplemental Security Awareness Training if your account is compromised. 

Report your lost or stolen campus-owned device to the Help Desk as soon as possible. The sooner it's reported the greater the chance of recovering the item.  

Let the Helpdesk know if any moderate or high risk data was stored on the device.  If you suspect the device was stolen a police report should be filed and the information provided to the Helpdesk.

To help maintain the highest levels of network security, multiple methods of protecting the campus community are employed by ITS to defend against new and potential threats.

Cisco Umbrella is a cloud-delivered security service. Cisco Umbrella uses the internet's infrastructure to block malicious destinations before a connection is ever established. The software acts as a filter in order to stop users from visiting any malicious, vulnerable, or compromised websites.

  • Malware, vulnerable sites, and phishing attacks.
  • Internet access originated from infected UWW computers.
  • BitTorrent sites.

All requests to remove an Umbrella block on a webpage need to be submitted via the Umbrella block page that appears when a webpage is blocked.

In an ongoing effort to combat phishing and email scams, our team has enhanced its external email tag to help identify when an email originates from an off-campus address. The goal of this external tag is to help faculty, staff, and students better identify potential phishing attempts and keep the UW-W community safe from cyber-attacks. The external tag will appear at the top of the email body in all caps and in bold reading, EXTERNAL EMAIL.

When you see this tag, remember this two-step verification process:

  1. Be cautious, and make sure you are expecting this email.
  2. Confirm this email is coming from who they claim to be by hovering over their email address.

Ironport is a network-based anti-spam service that discards emails that have a high probability of being spam. Ironport places questionable emails into quarantine so users can determine if the emails are spam. Users receive a daily message notifying them of their potential spam list. The quarantined messages will remain in your inbox for approximately 7-14 days.

The UW-Whitewater Ironport Service allows three different levels of anti-spam filtering: Low, Medium, and High. The default setting is "High." Users can adjust their spam filtering by using the self-service option to the right. Ironport also allows users to identify senders as either "safe" (not to be flagged as possible spam), or "blocked" (always to be flagged as possible spam).

IT Services Security Initiatives

To help maintain the highest levels of network security, our team employs a multi-pronged approach to information security. In particular, ITS:

  1. Works, in consultation with campus governance, to keep our campus practices in conformation with UW System Administrative Policy.
  2. Enacts change based on recommendations by security consultants like Stroz Friedberg and information security industry best practices.
  3. Employs multiple methods of educating and warning members of the campus community of new and potential threats.

UW System Administrative Policy and Information Security Best Practices

To better understand how campus policies and practices interface with UW System Administration policy as well as recommendations by security consultants, we encourage you to review: Cybersecurity: Everyone’s Responsibility.

Additional resources to help protect yourself online.

Cyber Security

Cyber attacks are malicious attempts to access or damage a computer or network system. Cyber attacks can lead to loss of money, theft of personal, financial, and medical information that can damage your reputation and safety. As part of the UW-W community, we must work together to keep our campus safe and secure when it comes to the threat of cyberattacks.

Cyber attacks can occur in several ways, including:

  • Accessing your office or personal computer, mobile phones, gaming systems, and other internet and Bluetooth-connected devices.
  • Damaging your financial security, including identity theft.
  • Blocking your access or deleting your personal information and accounts.
  • Targeting children and adults.
  • Complicating your employment, business services, transportation, and power grid.

You can avoid cyber risks by staying alert, and being prepared. The following are things you can do to protect yourself, your family, and your property before a cyberattack occurs:

  • Limit the personal information you share online. Change privacy settings and do not use location features.
  • Keep software applications and operating systems up-to-date.
  • Using a password manager, use upper and lowercase letters, numbers, and special characters, as well as, two-factor authentication (two methods of verification).
  • Use encrypted (secure) Internet communications, avoid open Wi-Fi networks in public spaces.
  • Only share personal information on secure sites (e.g. “https://”). Do not use sites with invalid certificates. Use a Virtual Private Network (VPN) that creates a more secure connection.

Safe Data Storage

  • Storage of your important data on your local (or C:) drive does not protect you from data corruption or loss! In order to protect your important data, use your network drive. Your network drive is backed up regularly and can be recovered in the event of data loss, your local drive, in many cases, cannot. UW-Whitewater provides network storage for all students, faculty, and staff.
  • If you are or have been using your local drive to store your data, then please copy your important documents and data to your network drive and start using your network drive to store and retrieve this data. More information about your network storage options is available on the File Storage Options page.

Social Media

  • Know how the site works before you join. Social networking sites are each set-up differently and offer a range of options. Some allow you to post to a small group of users, while others allow anyone to view your personal postings. Look at the different features and think about what level of openness you really want. Consider whether setting viewing restrictions can help control who sees your information.
  • Keep personal information to yourself. Your full name, Social Security number, address, phone number, bank or credit card account numbers (and that of others) do not belong on these sites. By posting them, you open yourself up to identity theft or stalkers.
  • Information lasts forever. Only post information you are comfortable with others seeing, including your professors, parents, current or future employers, coworkers, or the police. Even if you change your mind and delete what you posted, the information is still out there. Older versions may exist on someone else's computer and social networking sites can never fully remove these files.
  • Think before you share. Photos, videos, stories, blogs can all be used to form opinions of you or can be shared with others. Before posting, consider who will see these and whether you can share them with a smaller audience. Be considerate when passing on photos of friends - ask whether they would want that information shared.

Anti-spam services are maintained by ITS that block thousands of spam messages each week, however, the tactics being used to disseminate phishing scams and malicious email attachments are becoming increasingly complex, allowing some messages to evade the anti-spam filters. For some quick tips on Phishing, check out our "Click Wisely" PDF.

Check out some additional resources to help you catch those Phish!

Reminder: ITS will NEVER  ask for your password, either by phone or by email.

  • The email is claiming to come from someone at UW-W but the email address does not end in
  • An urgent call to action - e.g. you must act now
  • The email requests sensitive information such as login credentials, birthdate, SSN, financial information, etc. 
  • Misspelling and poor grammar
  • Threats or rewards - e.g. your access will be terminated or you've won a prize
  • Spoofing popular websites and companies
  • Suspicious links within the email
  • The email is from an unfamiliar sender or entity

Common approaches to tricking recipients

  • Posing as a supervisor or campus leader.
  • Posing as a government agency (The IRS and tax service businesses are especially common around tax season)
  • Posing as a "system administrator"
  • Utilizing a business's logo to appear legitimate (Online retailers and shipping companies are especially common)

Phishing scams are designed to trick recipients into sharing  login credentials in order to gain access to the recipients account. Another common method of gaining access to sensitive information is to send the recipient an attachment containing a virus that infects the computer. The viruses can be designed to:

  • Quietly relay sensitive information (i.e. financial information) back to the sender, without the user realizing their computer has a virus
  • Gain access to an account in order to spread the virus to other unsuspecting recipients
  • Lock access to computer files. "Ransomware" is a type of malware that will deny you access to critical data. The sender often demands payment in return for removing the virus.  

The senders of these malicious emails typically go to great lengths to make the malicious email look like a legitimate email. Often this is accomplished by using a logo or branding from a legitimate company or entity, or by "spoofing" a trusted email address to make it the email appear legitimate. Once an email account is compromised, it is often used to bombard other email users with the same malicious email.

This phishing message attempts to mimic a common automated message. 

  • The subject of this message was "IT Help Desk Security Login Alert !" - notice the sense of urgency.
  • The message was distributed to most mailboxes by an on-campus account that was compromised - not the actual Help Desk.

 Phishing email example

This phishing email attempts to mimic a message from a real company by utilizing the company's logo in the email header. Users who click the link are rerouted to a legitimate-looking webpage asking them to login. Rather than logging into the company's portal, the user is inadvertently providing their login credentials (e.g. - NetID and password).

Example malicious email that mimics a real technology company

This malicious email spoofs a email address in an attempt to make it appear like it was sent from a campus email account. The file attached to this email contained a virus.

Malicious email example spoofed UW-Whitewater domain

This phishing email attempts to leverage an existing company's brand in order to appear legitimate. Notice how another compromised account was used to send this malicious email

Example of a phishing email

If you receive an unsolicited job offer via email, there is a good chance it may be phony. Especially if it is too good to be true.

Here is how employment scams work:

  1. Emails regarding the fake job are sent out (or posted on an online job board). Often, the fake job is advertised as a "work from home" administrative positon. 
  2. Respondents receive counterfeit checks in the mail or via e-mail and are instructed to deposit the checks into their personal checking account. 
  3. The scammer then directs the respondent to withdraw the funds from their checking account and send a portion, via wire transfer, to another individual. Often, the transfer of funds is to a "vendor", purportedly for equipment, materials, or software necessary for the job.
  4. The checks are confirmed to be fraudulent by the bank after they are cashed.

Ransomware is a type of malicious software, or malware, that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return. Ransomware attacks can cause costly disruptions to operations and the loss of critical information and data.

Tips for Avoiding Ransomware  

The best way to avoid being exposed to ransomware—or any type of malware—is to be a cautious and conscientious computer user. Malware distributors have gotten increasingly savvy, and you need to be careful about what you download and click on. 

Other tips:

  • Keep operating systems, software, and applications current and up to date. 
  • Make sure anti-virus solutions are set to automatically update and run regular scans.
  • Back up data regularly and double-check that those backups were completed.
  • Secure your backups. Make sure they are not connected to the computers and networks they are backing up.

Want to learn more about this service? Get Help »