UAH Community: We are fortunate to have cyber security defenses in place to protect our network, devices and data at UAH. Experts are warning about — and we have witnessed — ongoing attempted attacks from nation-states during this fractious time in the world. As a reminder:  you play a key role in protecting the university information systems, data and operations. The majority of these cyberattacks begin with phishing emails and then exploit technology vulnerabilities to compromise vital technology resources. Below are some key reminders that will help protect our organization:

  • Be aware of signs of a phish. These signs include poor grammar or spelling, requests for immediate assistance, requests for usernames and passwords and fake or “spoofed” domains.
    • Always look at link destinations before you click on a link in an email.
    • Emails that originate from outside of the UAH.EDU email domain will have an [EXTERNAL] label in the subject line.  UAH personnel should be using their UAH email addresses for official communication.
    • Campus users with UAH.EDU email addresses should report suspicious emails to Google by clicking the 3 vertical dots in the top right corner of a suspicious email and clicking "Report Phishing".  Alternately, you can open up a ticket with UAH OIT to report a potential phishing email.
  • Keep your systems updated. If you manage IT resources, ensure your systems, servers, devices and applications are up to date with the latest security patches. Ensure all servers and end user devices have the appropriate security tools (such as Crowdstrike) installed.
  • Ensure all data is stored appropriately.
  • Connect securely. Use the EDUROAM WiFi network while on campus.
    • When connecting to onsite resources while off campus, utilize the Pulse Secure VPN to do so securely.

Please do not hesitate to reach out to the OIT Help Desk or the CISO with any questions or concerns:

OIT Help Desk -


Thank you for all that you do for UAH.

Malcolm Rice
Chief Information Officer

Jeremy Shelley
Chief Information Security Officer