Blog
We can’t protect the campus without your help. Check out our most recent blog posts to learn more about cybersecurity.
-
Happy Earth Day, UTD Comets
Read More: Happy Earth Day, UTD CometsThe Information Security Office will have representatives on campus tomorrow, April 20th 2023 from 11am to 1pm in celebration of this year’s upcoming Earth Day holiday. Come join us at…
-
Policies, Standards, Procedures, and Guidelines
Read More: Policies, Standards, Procedures, and GuidelinesThere are many reasons for an organization to create, maintain, and communicate documentation about its operations. These promote consistent service delivery over time and promote a culture of risk reduction…
-
Navigating Unwanted Email Communication
Read More: Navigating Unwanted Email CommunicationUnwanted emails, such as spam and phishing messages, are an all-too-common nuisance for our campus community. While UT Dallas has taken steps to protect our students, faculty and staff as…
-
MOVEit Vulnerability’s Impact on UTD
Read More: MOVEit Vulnerability’s Impact on UTDMOVEit software, which helps organizations transfer large files, was recently exploited by a criminal organization known as Clop. Nationwide, millions of victims have been impacted by the MOVEit vulnerability, including…
-
Helping Protect Computers Across Campus
Read More: Helping Protect Computers Across CampusUT Dallas continues to be targeted by criminals who would harm us to achieve personal gain. Therefore, it is important to reduce vulnerabilities and manage IT systems in a consistent…
-
The Dangers of Post-Tax Season
Read More: The Dangers of Post-Tax SeasonTax season is a good time to remind taxpayers to be aware of criminals making aggressive attempts at stealing taxpayer monies or personal information. The IRS will never contact taxpayers…
-
Are Mobile Devices the New Target?
Read More: Are Mobile Devices the New Target?Mobile phones provide convenient and instant access to technologies like email, IoT, applications, and much more. Unfortunately, mobile security hasn’t been given as much attention as some of the more…
-
Student Loan Repayment Scams
Read More: Student Loan Repayment ScamsDue to the recent resurge of COVID-19, President Biden has extended the federal student loan payment pause to 9/30/2021. U.S. Congress is also considering another extension after the current pause…
-
How To Deal With Unemployment Scams
Read More: How To Deal With Unemployment ScamsAs the global pandemic has kept its hold on the world, many countries have established assistance programs to help individuals who find themselves unemployed or in need of assistance. Here…
-
Portable Computing Device Security
Read More: Portable Computing Device SecurityStudents are increasingly dependent upon portable computing devices to support their education goals. As more students experience online classes, bedrooms and patios are becoming the new classrooms. Families have rapidly
-
Becoming a Human Firewall
Read More: Becoming a Human FirewallTrying to get through school is stressful on its own, but it is increasingly stressful because cyber criminals target students. These attacks are motivated by access to personal information, financial…
-
Beware the dangers of tax season
Read More: Beware the dangers of tax seasonBesides getting your refund back sooner, there are lots of benefits to filing your taxes early. If you take too long to file your taxes, criminals may be able to…
-
Did COVID-19 Change Information Security?
Read More: Did COVID-19 Change Information Security?It did not take long for almost every aspect of our world to feel an impact from the COVID-19 pandemic. Retail stores now have barriers and floor markings for customers…
-
Cyber Commuting 101: Tips and Checklist
Read More: Cyber Commuting 101: Tips and ChecklistAccording to CNBC, over 70% of the US population now performs some remote work regularly. While we all love the idea of working in our pajamas, working from home poses…
-
Online Shopping 101: How to be Safe
Read More: Online Shopping 101: How to be SafeBe it for a birthday, graduation, holidays, or pretty much any special occasion, people are always on the mission to find the right gifts for their loved ones. In the…
-
Social Engineering: The People Hackers
Read More: Social Engineering: The People HackersSocial engineering uses a human’s helpful nature against them to access personal data and gain entry into secure systems, such as bank accounts. Social engineering can take many forms, from…
-
Phishing Explained – Vishing and Smishing
Read More: Phishing Explained – Vishing and SmishingThere are many ways people can try to scam you. One of the most common and popular tactics is phishing. There are several forms of phishing, including whaling, spear-phishing, search…
-
6 Steps To Stay Secure Online
Read More: 6 Steps To Stay Secure OnlineThe Internet is a very dangerous place nowadays. Long ago, security was only the responsibility of IT department. They also believed that as long as there was a right firewall,…
-
BYOD – Can It Hurt or Help You?
Read More: BYOD – Can It Hurt or Help You?Bring your own device (BYOD) refers to the trend of students using personal devices, such as smartphones, personal computers, tablets, or USB drives, to connect to the school’s networks and…
-
MFA: What Is It and How Does It Help?
Read More: MFA: What Is It and How Does It Help?Over the past decade, “MFA” has become something of a buzzword when it comes to privacy. However, you may be left wondering what exactly this is why you should care…
-
7 Simple Steps to Protect Sensitive Data
Read More: 7 Simple Steps to Protect Sensitive DataAt UTD, you will likely have access to valuable information while you perform your assignments. You are trusted to maintain your professionalism, follow procedures and ask questions when you are…
-
Box 101 – Free data storage
Read More: Box 101 – Free data storageBox.com allows you to keep your files in one place so you can access them anywhere from any device online or through the Box app. UTD provides Box accounts to…
-
6 Steps to Secure Your Mobile Phone
Read More: 6 Steps to Secure Your Mobile PhoneMobile devices such as phones and tablets are easy to lose and often targeted for theft. They contain very personal information such as contacts, phone numbers, emails, and sometimes sensitive…
-
Don’t get Hooked by Phishing Scams
Read More: Don’t get Hooked by Phishing ScamsIf you need to report a scam or suspect you have been phished, please contact the Information Security Office by filling out a contact form or by submitting an email…
-
Why do I have to deal with passwords?
Read More: Why do I have to deal with passwords?Passwords have been a thing of nightmares ever since they were invented. We have all been through it – you have to create a new login somewhere, you think of…