  {"id":15234,"date":"2025-08-22T10:12:40","date_gmt":"2025-08-22T15:12:40","guid":{"rendered":"https:\/\/uwm.edu\/information-technology\/?page_id=15234"},"modified":"2026-01-21T09:52:34","modified_gmt":"2026-01-21T15:52:34","slug":"data-security","status":"publish","type":"page","link":"https:\/\/uwm.edu\/information-technology\/cybersecurity\/data-security\/","title":{"rendered":"Data Security"},"content":{"rendered":"\n<div class=\"uwm-l-row\">\n<div class=\"uwm-l-col\">\n<p>Keeping your personal data secure is essential in today\u2019s digital world. In the sections below, you\u2019ll find practical tips and tools to help you build strong habits for protecting your information across every platform you use.<\/p>\n\n\n\n<hr class=\"has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-virtual-private-networks-vpn\">Virtual Private Networks (VPN)<\/h2>\n\n\n\n<p>Free public Wi-Fi can be convenient, but it often comes with hidden risks. If you&#8217;re connecting to an unencrypted network without using a Virtual Private Network (VPN), your personal data could be exposed to cyber threats.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-does-uwm-have-a-free-vpn-for-campus-members\">Does 51ÁÔÆæ have a free VPN for campus members?<\/h3>\n\n\n\n<p>51ÁÔÆæ offers all campus members a free download of the Palo Alto VPN. Palo Alto provides encryption to 51ÁÔÆæ-provided products and services (PAWS, Canvas, M365, etc.) and the data you generate when using them. For instructions on how to download the Palo Alto VPN to your devices, visit our <a href=\"https:\/\/kb.uwm.edu\/search.php?q=palo+alto\">KnowledgeBase<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-i-want-to-encrypt-all-my-traffic-what-kind-of-vpn-should-i-purchase\">I want to encrypt all my traffic. What kind of VPN should I purchase?<\/h3>\n\n\n\n<p>Most VPN companies provide more than sufficient levels of security for all your devices, however; if you&#8217;re looking for specific recommendations, make sure the VPN provider you choose includes:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>AES128 (or better) level encryption<\/li>\n\n\n\n<li>IKEv2\/IPSEC protocol<\/li>\n\n\n\n<li>Cross-platform compatibility<\/li>\n<\/ul>\n\n\n\n<hr class=\"has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-passphrase-creation\">Passphrase Creation<\/h2>\n\n\n\n<p>Strong passphrases are a key part of protecting your digital identity. By using longer, more complex phrases instead of single words, you significantly increase the time it would take for an attacker to crack your password using brute-force methods. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-here-are-some-best-practices-to-keep-in-mind-when-creating-your-next-passphrase\">Here are some best practices to keep in mind when creating your next passphrase:<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Use a phrase instead of a single word.<\/strong> A longer passphrase offers much stronger protection than a simple word.<\/li>\n\n\n\n<li><strong>Mix uppercase and lowercase letters.<\/strong> Capitalization adds complexity.<\/li>\n\n\n\n<li><strong>Include symbols.<\/strong> Special characters like <em>@, !, $<\/em> make your passphrase harder to guess.<\/li>\n\n\n\n<li><strong>Add numbers.<\/strong> Including digits increases strength.<\/li>\n\n\n\n<li><strong>Use the maximum number of characters allowed.<\/strong> Longer passphrases are more resilient against brute-force attacks. <\/li>\n\n\n\n<li><strong>Create a unique passphrase for each account or service.<\/strong> Reusing passwords increases vulnerability. <\/li>\n\n\n\n<li><strong>Consider using a password manager.<\/strong> These tools securely store your credentials so you don\u2019t have to remember each one.<\/li>\n<\/ul>\n\n\n\n<hr class=\"has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-antivirus\">Antivirus<\/h2>\n\n\n\n<p>51ÁÔÆæ IT recommends installing, updating, and regularly running antivirus software to protect your devices against virtual threats. Below are some suggested antivirus applications and resources meant for <span style=\"text-decoration: underline\"><strong>personal devices<\/strong><\/span>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-antivirus-suggestions\">Antivirus Suggestions<\/h3>\n\n\n\n<div class=\"uwm-p-tabs\" data-tabs-prefix-class=\"uwm-p-tabs\"><ul class=\"uwm-p-tablist\" data-hx=\"h2\"><li class=\"uwm-p-tablist--item\"><a href=\"#tab-sude-windows-os\" class=\"uwm-p-tablist--link\">Windows OS<\/a><\/li><li class=\"uwm-p-tablist--item\"><a href=\"#tab-sude-mac-os\" class=\"uwm-p-tablist--link\">Mac OS<\/a><\/li><li class=\"uwm-p-tablist--item\"><a href=\"#tab-sude-mobile-device\" class=\"uwm-p-tablist--link\">Mobile Device<\/a><\/li><\/ul><div class=\"uwm-p-tabcontent\">\n<div id=\"tab-sude-windows-os\" class=\"uwm-p-tabcontent--pane\">\n<p>These are the recommended antivirus services for Windows devices:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.pcmag.com\/roundup\/256703\/the-best-antivirus-protection\">The Best Antivirus Protection<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.pcmag.com\/roundup\/267984\/the-best-free-antivirus-protection\">The Best Free Antivirus Protection<\/a><\/li>\n\n\n\n<li>Ensure your device is running the newest operating system possible. Windows Defender is included by default with Windows 10 and newer.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div id=\"tab-sude-mac-os\" class=\"uwm-p-tabcontent--pane\">\n<p>These are the recommended antivirus services for Mac devices:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.macworld.com\/article\/668850\/best-mac-antivirus-software.html\">Best Antivirus Software for Mac<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.tomsguide.com\/best-picks\/best-mac-antivirus\">Best Mac antivirus: Do I need antivirus for Mac?<\/a><\/li>\n<\/ul>\n<\/div>\n\n\n\n<div id=\"tab-sude-mobile-device\" class=\"uwm-p-tabcontent--pane\">\n<p>Most current-generation mobile devices come with antivirus software pre-installed, however; 51ÁÔÆæ IT recommends researching all applications you plan to download on your devices before accepting any user agreements.<\/p>\n\n\n\n<p><em><strong>Disclaimer: These recommendations are for <span style=\"text-decoration: underline\">personal devices<\/span>.<\/strong> University-owned hardware should have antivirus software specific to 51ÁÔÆæ&#8217;s data protection needs already installed.<\/em><\/p>\n<\/div>\n<\/div><\/div>\n\n\n\n<p>To report security-related issues, get help installing antivirus software, or receive help with other issues, contact the <a href=\"https:\/\/uwm.edu\/information-technology\/help\/\">51ÁÔÆæ Help Desk<\/a>.<\/p>\n<\/div>\n\n\n\n<div class=\"uwm-l-col uwm-l-col--4 uwm-l-offset--1\"><div class=\"content_block\" id=\"custom_post_widget-12566\">\n<div class=\"uwm-p-card uwm-p-card--color-head uwm-p-card--contact uwm-u-mb-40\"><div class=\"uwm-p-card--profile-header\"><div class=\"uwm-p-card--profile-header-text\"><div class=\"uwm-p-card--title\">51ÁÔÆæ Help Desk<\/div><\/div><\/div><div class=\"uwm-p-card--body\"><div class=\"uwm-p-card--content\">\n<ul class=\"uwm-c-list--contact uwm-c-list--cleanlist\">\n<li><i class=\"fa-solid fa-envelope fa-fw\"><\/i><a href=\"mailto:helpdesk@it.uwm.edu\">helpdesk@it.uwm.edu<\/a><\/li>\n\n\n\n<li><i class=\"fa-solid fa-mobile-screen-button fa-fw\"><\/i><a href=\"tel:414-229-4040\">414-229-4040<\/a><\/li>\n\n\n<\/ul>\n<\/div><\/div><a href=\"https:\/\/uwm.edu\/information-technology\/request-support\/\" class=\"uwm-p-card--link\">Online Support Form<\/a><\/div>\n<\/div>\n\n\n\n<div class=\"uwm-l-buttons--full\">\n<a class=\"uwm-c-button uwm-c-button--full uwm-u-mb-20\" href=\"https:\/\/uwm.edu\/information-technology\/cybersecurity\/cybersecurity-incident-form\/\" rel=\"\">Cybersecurity Incident Form<\/a>\n<\/div>\n\n\n\n<div class=\"uwm-l-buttons--full\">\n<a class=\"uwm-c-button uwm-c-button--full uwm-u-mb-20\" href=\"https:\/\/uwm.edu\/information-technology\/cybersecurity\/request-secure-data-disposal-through-cts\/\" rel=\"\">Request Secure Data Disposal<\/a>\n<\/div>\n\n\n<div class=\"uwm-block-otp-nav \"><\/div><\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":19041,"featured_media":0,"parent":1658,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":"","uwm_wg_additional_authors":[]},"class_list":["post-15234","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Technology Resources<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uwm.edu\/information-technology\/cybersecurity\/data-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uwm.edu\/information-technology\/cybersecurity\/data-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Technology Resources\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-21T15:52:34+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@51ÁÔÆæ_IT\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/cybersecurity\\\/data-security\\\/\",\"url\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/cybersecurity\\\/data-security\\\/\",\"name\":\"Data Security - Technology Resources\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/#website\"},\"datePublished\":\"2025-08-22T15:12:40+00:00\",\"dateModified\":\"2026-01-21T15:52:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/cybersecurity\\\/data-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/cybersecurity\\\/data-security\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/cybersecurity\\\/data-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Data Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/#website\",\"url\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/\",\"name\":\"Technology Resources\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Technology Resources","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uwm.edu\/information-technology\/cybersecurity\/data-security\/","og_locale":"en_US","og_type":"article","og_title":"Data Security","og_url":"https:\/\/uwm.edu\/information-technology\/cybersecurity\/data-security\/","og_site_name":"Technology Resources","article_modified_time":"2026-01-21T15:52:34+00:00","twitter_card":"summary_large_image","twitter_site":"@51ÁÔÆæ_IT","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/uwm.edu\/information-technology\/cybersecurity\/data-security\/","url":"https:\/\/uwm.edu\/information-technology\/cybersecurity\/data-security\/","name":"Data Security - Technology Resources","isPartOf":{"@id":"https:\/\/uwm.edu\/information-technology\/#website"},"datePublished":"2025-08-22T15:12:40+00:00","dateModified":"2026-01-21T15:52:34+00:00","breadcrumb":{"@id":"https:\/\/uwm.edu\/information-technology\/cybersecurity\/data-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uwm.edu\/information-technology\/cybersecurity\/data-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/uwm.edu\/information-technology\/cybersecurity\/data-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/uwm.edu\/information-technology\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/uwm.edu\/information-technology\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"Data Security"}]},{"@type":"WebSite","@id":"https:\/\/uwm.edu\/information-technology\/#website","url":"https:\/\/uwm.edu\/information-technology\/","name":"Technology Resources","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uwm.edu\/information-technology\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"acf":[],"publishpress_future_action":{"enabled":false,"date":"2026-04-24 15:18:14","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/pages\/15234","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/users\/19041"}],"replies":[{"embeddable":true,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/comments?post=15234"}],"version-history":[{"count":16,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/pages\/15234\/revisions"}],"predecessor-version":[{"id":16027,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/pages\/15234\/revisions\/16027"}],"up":[{"embeddable":true,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/pages\/1658"}],"wp:attachment":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/media?parent=15234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}