Skip to content Skip to main navigation Report an accessibility issue
Information Security

Learning Library



Check for Recent Email Scams

Email scams are an ever-evolving threat in this digital world. It can be hard to tell what is real and what is the latest bit of social engineering. Cross check suspicious emails at the OIT Status Page! We log recently reported scams in the UT email ecosystem that you can compare your email to. Stay informed!

Screen Capture of the OIT Scams Page, Image text includes Subscribe to Updates, OIT HelpDesk | OIT Home | OIT Scams Site, All Systems Operational

Importance of Security

Read about why YOU should care about security and what we are doing to keep your data safe.

Scam Types

Arm yourself with the knowledge of how these scams work

Benefits & Tips for You

A collection of actions YOU can take to keep yourself safe from different types of malicious intent.

Protecting University Data

Learn how to protect university data by managing systems and applications responsibly.

Terms & Glossary

There is a lot of jargon when discussing security. Here is a glossary to help break it down.

Security News

Stay up to date on news happening in the cybersecurity world

Recent Articles

View all articles

The Importance of Software Updates

Published on November 15, 2024

There is always a bit of annoyance when we see that our computer needs an update. It always seems to […]

ReadThe Importance of Software Updates

Tips for Securing Linux

Published on October 30, 2024

The third most popular operating system, Linux, is mostly unknown to the average person. However, Linux has been gaining popularity […]

ReadTips for Securing Linux

Passwords, Passwords Everywhere!

Published on October 25, 2024

Did you know that the average person uses the same three to seven passwords to log in to over 170 […]

ReadPasswords, Passwords Everywhere!

Stay Safe Online When Using AI

Published on October 21, 2024

Continuing with National Cyber Security Awareness Month, a frankly unavoidable tool is AI. AI is becoming more integrated with computing systems […]

ReadStay Safe Online When Using AI