The University of Texas at Dallas
close menu

Page Not Found

  • Blog Policies, Standards, Procedures, and Guidelines December 20, 2023 -

    There are many reasons for an organization to create, maintain, and communicate documentation about its operations. These promote consistent service delivery over time and promote a culture of risk reduction and compliance with applicable requirements

    Read more
  • Blog Navigating Unwanted Email Communication October 17, 2023 -

    Unwanted emails, such as spam and phishing messages, are an all-too-common nuisance for our campus community. While UT Dallas has taken steps to protect our students, faculty and staff as much as possible, the Information Security Office (ISO)

    Read more
  • Blog MOVEit Vulnerability’s Impact on UTD September 11, 2023 -

    MOVEit software, which helps organizations transfer large files, was recently exploited by a criminal organization known as Clop. Nationwide, millions of victims have been impacted by the MOVEit vulnerability, including some universities in Texas

    Read more
  • Blog Helping Protect Computers Across Campus May 18, 2023 -

    UT Dallas continues to be targeted by criminals who would harm us to achieve personal gain. Therefore, it is important to reduce vulnerabilities and manage IT systems in a consistent and reasonable manner. Throughout Summer 2023, the Information Security Office

    Read more
  • Blog Happy Earth Day, UTD Comets April 19, 2023 -

    The Information Security Office will have representatives on campus tomorrow, April 20th 2023 from 11am to 1pm in celebration of this year’s upcoming Earth Day holiday. Come join us at Lot G to have a chat with our Chief Information Security Officer

    Read more
  • Blog The Dangers of Post-Tax Season June 9, 2022 -

    Tax season is a good time to remind taxpayers to be aware of criminals making aggressive attempts at stealing taxpayer monies or personal information. The IRS will never contact taxpayers by email, text messages or social media

    Read more
  • Blog Are Mobile Devices the New Target? February 22, 2022 -

    Mobile phones provide convenient and instant access to technologies like email, IoT, applications, and much more. Unfortunately, mobile security hasn’t been given as much attention as some of the more established technologies. For example,

    Read more
  • Blog Student Loan Repayment Scams August 4, 2021 -

    Due to the recent resurge of COVID-19, President Biden has extended the federal student loan payment pause to 9/30/2021. U.S. Congress is also considering another extension after the current pause expires. Scammers see the commotion

    Read more
  • Blog How to Deal With Unemployment Scams May 13, 2021 -

    As the global pandemic has kept its hold on the world, many countries have established assistance programs to help individuals who find themselves unemployed or in need of assistance. Here in the United States,

    Read more
  • Blog Portable Computing Device Security Woman working on laptop March 4, 2021 -

    Students are increasingly dependent upon portable computing devices to support their education goals. As more students experience online classes, bedrooms and patios are becoming the new classrooms. Families have rapidly

    Read more
  • Blog Becoming a Human Firewall February 23, 2021 -

    Trying to get through school is stressful on its own, but it is increasingly stressful because cyber criminals target students. These attacks are motivated by access to personal information, financial gain and access to

    Read more
  • Blog Beware the dangers of tax season instructor helping students February 11, 2021 -

    Besides getting your refund back sooner, there are lots of benefits to filing your taxes early. If you take too long to file your taxes, criminals may be able to file a fraudulent tax return in your name with stolen information. The thieves could

    Read more
  • Blog Did COVID-19 Change Information Security? February 9, 2021 -

    It did not take long for almost every aspect of our world to feel an impact from the COVID-19 pandemic. Retail stores now have barriers and floor markings for customers to enforce social distancing. Television shows are including

    Read more
  • Blog 2020 Holiday Scam Trends and Tips December 7, 2020 -

    The holidays are the most wonderful time of the year, especially for scammers. While you are plotting how to surprise your family members with their gifts, criminals are plotting ways of scheming you out of your hard-earned money.

    Read more
  • Blog Identifying Phishing (and spooky stories) Halloween whoosh with temoc October 29, 2020 -

    While Halloween is scary, cyberattacks can be even more frightening. Ransomware locks your computer and demands a payment to unlock it. Your best defense against this is to keep your operating system updated with current

    Read more
  • Blog Patching Every Device in The Household Patching Every Device in The Household banner photo -

    Preventive maintenance is important in many areas of life. Doctors recommend exercise, good diet, proper sleep, and an annual physical exam to ensure that people remain healthy. If you own an automobile, you know that oil

    Read more
  • Blog Smarter Password Management Smarter Password Management banner photo October 12, 2020 -

    Recent studies show that the average person has 70-80 online accounts. It seems almost impossible to remember unique passwords for every single account. Unfortunately, this often leads us to re-use a handful of our most memorable

    Read more
  • Blog ISO Conversation – Job Scams Explained ISO Conversation – Job Scams Explained banner photo September 10, 2020 -

    Students are receiving emails asking them to apply for a job that they can perform a few hours per week from home. These emails appear to come from a well-known corporation, someone claiming they’re a professor, etc.

    Read more
  • Blog Awareness Training Enhancement Notes Awareness Training Enhancement Notes banner photo May 5, 2020 -

    Criminals continue to target universities to steal valuable research data, personal information and financial resources. Many attacks target people, rather than computers. Your commitment to service and willingness to trust

    Read more
  • Blog Cyber Commuting 101: Tips and Checklist March 13, 2020 -

    According to CNBC, over 70% of the US population now performs some remote work regularly. While we all love the idea of working in our pajamas, working from home poses some unique challenges to productivity

    Read more
  • Blog Online Shopping 101: How to be Safe January 29, 2020 -

    Be it for a birthday, graduation, holidays, or pretty much any special occasion, people are always on the mission to find the right gifts for their loved ones. In the olden days, we would have to jump in the car and drive

    Read more
  • Blog Social Engineering: The People Hackers January 15, 2020 -

    Social engineering uses a human’s helpful nature against them to access personal data and gain entry into secure systems, such as bank accounts. Social engineering can take many forms, from an urgent company email to

    Read more
  • Blog Phishing Explained – Vishing and Smishing January 14, 2020 -

    There are many ways people can try to scam you. One of the most common and popular tactics is phishing. There are several forms of phishing, including whaling, spear-phishing, search engine fishing, etc. Just like these

    Read more
  • Blog 6 Steps to Stay Secure Online -

    The Internet is a very dangerous place nowadays. Long ago, security was only the responsibility of IT department. They also believed that as long as there was a right firewall, antivirus packages, and encryption, we would all be safe

    Read more
  • Blog BYOD – Can it hurt or help you? -

    Bring your own device (BYOD) refers to the trend of students using personal devices, such as smartphones, personal computers, tablets, or USB drives, to connect to the school’s networks and access tools, such as

    Read more
  • Blog MFA: What Is It and How Does It Help? January 13, 2020 -

    Over the past decade, “MFA” has become something of a buzzword when it comes to privacy. However, you may be left wondering what exactly this is why you should care about it. To start off, the acronym MFA stands for

    Read more
  • Blog 7 Simple Steps to Protect Sensitive Data Picture of student on computer July 10, 2019 -

    At UTD, you will likely have access to valuable information while you perform your assignments. You are trusted to maintain your professionalism, follow procedures and ask questions when you are unsure how

    Read more
  • Blog Box 101 – Free data storage June 6, 2019 -

    Box.com allows you to keep your files in one place so you can access them anywhere from any device online or through the Box app. UTD provides Box accounts to anyone with an active UTD NetID; Box offers you 1TB of free cloud storage.

    Read more
  • Blog 6 Steps to Secure Your Mobile Phone Picture of student writing -

    Mobile devices such as phones and tablets are easy to lose and often targeted for theft. They contain very personal information such as contacts, phone numbers, emails, and sometimes sensitive University data. The following best

    Read more
  • Blog Don’t get Hooked by Phishing Scams -

    If you need to report a scam or suspect you have been phished, please contact the Information Security Office by filling out a contact form or by submitting an email to infosecurity@utdallas.edu. Please preserve the original

    Read more
  • Blog Why do I have to deal with passwords? Close up picture of a keyboard -

    Passwords have been a thing of nightmares ever since they were invented. We have all been through it – you have to create a new login somewhere, you think of a neat username, you create a super complex password and

    Read more