Page Not Found
-
Blog
Policies, Standards, Procedures, and Guidelines
December 20, 2023 -
There are many reasons for an organization to create, maintain, and communicate documentation about its operations. These promote consistent service delivery over time and promote a culture of risk reduction and compliance with applicable requirements
Read more -
Blog
Navigating Unwanted Email Communication
October 17, 2023 -
Unwanted emails, such as spam and phishing messages, are an all-too-common nuisance for our campus community. While UT Dallas has taken steps to protect our students, faculty and staff as much as possible, the Information Security Office (ISO)
Read more -
Blog
MOVEit Vulnerability’s Impact on UTD
September 11, 2023 -
MOVEit software, which helps organizations transfer large files, was recently exploited by a criminal organization known as Clop. Nationwide, millions of victims have been impacted by the MOVEit vulnerability, including some universities in Texas
Read more -
Blog
Helping Protect Computers Across Campus
May 18, 2023 -
UT Dallas continues to be targeted by criminals who would harm us to achieve personal gain. Therefore, it is important to reduce vulnerabilities and manage IT systems in a consistent and reasonable manner. Throughout Summer 2023, the Information Security Office
Read more -
Blog
Happy Earth Day, UTD Comets
April 19, 2023 -
The Information Security Office will have representatives on campus tomorrow, April 20th 2023 from 11am to 1pm in celebration of this year’s upcoming Earth Day holiday. Come join us at Lot G to have a chat with our Chief Information Security Officer
Read more -
Blog
The Dangers of Post-Tax Season
June 9, 2022 -
Tax season is a good time to remind taxpayers to be aware of criminals making aggressive attempts at stealing taxpayer monies or personal information. The IRS will never contact taxpayers by email, text messages or social media
Read more -
Blog
Are Mobile Devices the New Target?
February 22, 2022 -
Mobile phones provide convenient and instant access to technologies like email, IoT, applications, and much more. Unfortunately, mobile security hasn’t been given as much attention as some of the more established technologies. For example,
Read more -
Blog
Student Loan Repayment Scams
August 4, 2021 -
Due to the recent resurge of COVID-19, President Biden has extended the federal student loan payment pause to 9/30/2021. U.S. Congress is also considering another extension after the current pause expires. Scammers see the commotion
Read more -
Blog
How to Deal With Unemployment Scams
May 13, 2021 -
As the global pandemic has kept its hold on the world, many countries have established assistance programs to help individuals who find themselves unemployed or in need of assistance. Here in the United States,
Read more -
Blog
Portable Computing Device Security
March 4, 2021 -
Students are increasingly dependent upon portable computing devices to support their education goals. As more students experience online classes, bedrooms and patios are becoming the new classrooms. Families have rapidly
Read more -
Blog
Becoming a Human Firewall
February 23, 2021 -
Trying to get through school is stressful on its own, but it is increasingly stressful because cyber criminals target students. These attacks are motivated by access to personal information, financial gain and access to
Read more -
Blog
Beware the dangers of tax season
February 11, 2021 -
Besides getting your refund back sooner, there are lots of benefits to filing your taxes early. If you take too long to file your taxes, criminals may be able to file a fraudulent tax return in your name with stolen information. The thieves could
Read more -
Blog
Did COVID-19 Change Information Security?
February 9, 2021 -
It did not take long for almost every aspect of our world to feel an impact from the COVID-19 pandemic. Retail stores now have barriers and floor markings for customers to enforce social distancing. Television shows are including
Read more -
Blog
2020 Holiday Scam Trends and Tips
December 7, 2020 -
The holidays are the most wonderful time of the year, especially for scammers. While you are plotting how to surprise your family members with their gifts, criminals are plotting ways of scheming you out of your hard-earned money.
Read more -
Blog
Identifying Phishing (and spooky stories)
October 29, 2020 -
While Halloween is scary, cyberattacks can be even more frightening. Ransomware locks your computer and demands a payment to unlock it. Your best defense against this is to keep your operating system updated with current
Read more -
Blog
Patching Every Device in The Household
-
Preventive maintenance is important in many areas of life. Doctors recommend exercise, good diet, proper sleep, and an annual physical exam to ensure that people remain healthy. If you own an automobile, you know that oil
Read more -
Blog
Smarter Password Management
October 12, 2020 -
Recent studies show that the average person has 70-80 online accounts. It seems almost impossible to remember unique passwords for every single account. Unfortunately, this often leads us to re-use a handful of our most memorable
Read more -
Blog
ISO Conversation – Job Scams Explained
September 10, 2020 -
Students are receiving emails asking them to apply for a job that they can perform a few hours per week from home. These emails appear to come from a well-known corporation, someone claiming they’re a professor, etc.
Read more -
Blog
Awareness Training Enhancement Notes
May 5, 2020 -
Criminals continue to target universities to steal valuable research data, personal information and financial resources. Many attacks target people, rather than computers. Your commitment to service and willingness to trust
Read more -
Blog
Cyber Commuting 101: Tips and Checklist
March 13, 2020 -
According to CNBC, over 70% of the US population now performs some remote work regularly. While we all love the idea of working in our pajamas, working from home poses some unique challenges to productivity
Read more -
Blog
Online Shopping 101: How to be Safe
January 29, 2020 -
Be it for a birthday, graduation, holidays, or pretty much any special occasion, people are always on the mission to find the right gifts for their loved ones. In the olden days, we would have to jump in the car and drive
Read more -
Blog
Social Engineering: The People Hackers
January 15, 2020 -
Social engineering uses a human’s helpful nature against them to access personal data and gain entry into secure systems, such as bank accounts. Social engineering can take many forms, from an urgent company email to
Read more -
Blog
Phishing Explained – Vishing and Smishing
January 14, 2020 -
There are many ways people can try to scam you. One of the most common and popular tactics is phishing. There are several forms of phishing, including whaling, spear-phishing, search engine fishing, etc. Just like these
Read more -
Blog
6 Steps to Stay Secure Online
-
The Internet is a very dangerous place nowadays. Long ago, security was only the responsibility of IT department. They also believed that as long as there was a right firewall, antivirus packages, and encryption, we would all be safe
Read more -
Blog
BYOD – Can it hurt or help you?
-
Bring your own device (BYOD) refers to the trend of students using personal devices, such as smartphones, personal computers, tablets, or USB drives, to connect to the school’s networks and access tools, such as
Read more -
Blog
MFA: What Is It and How Does It Help?
January 13, 2020 -
Over the past decade, “MFA” has become something of a buzzword when it comes to privacy. However, you may be left wondering what exactly this is why you should care about it. To start off, the acronym MFA stands for
Read more -
Blog
7 Simple Steps to Protect Sensitive Data
July 10, 2019 -
At UTD, you will likely have access to valuable information while you perform your assignments. You are trusted to maintain your professionalism, follow procedures and ask questions when you are unsure how
Read more -
Blog
Box 101 – Free data storage
June 6, 2019 -
Box.com allows you to keep your files in one place so you can access them anywhere from any device online or through the Box app. UTD provides Box accounts to anyone with an active UTD NetID; Box offers you 1TB of free cloud storage.
Read more -
Blog
6 Steps to Secure Your Mobile Phone
-
Mobile devices such as phones and tablets are easy to lose and often targeted for theft. They contain very personal information such as contacts, phone numbers, emails, and sometimes sensitive University data. The following best
Read more -
Blog
Don’t get Hooked by Phishing Scams
-
If you need to report a scam or suspect you have been phished, please contact the Information Security Office by filling out a contact form or by submitting an email to infosecurity@utdallas.edu. Please preserve the original
Read more -
Blog
Why do I have to deal with passwords?
-
Passwords have been a thing of nightmares ever since they were invented. We have all been through it – you have to create a new login somewhere, you think of a neat username, you create a super complex password and
Read more