Article Archive
Importance of Security
Information security is about addressing and reducing IT RISK. It’s easy to overlook risk as a topic when all you hear is talk about passwords, firewalls, encryption, policies, or two-factor authentication. In this section, you’ll read about how the university is at risk and what you can do to reduce the risk in your group, department, and college.
The Importance of Software Updates
Published on November 15, 2024
There is always a bit of annoyance when we see that our computer needs an update. It always seems to […]
Read The Importance of Software UpdatesPasswords, Passwords Everywhere!
Published on October 25, 2024
Did you know that the average person uses the same three to seven passwords to log in to over 170 […]
Read Passwords, Passwords Everywhere!What is Encryption?
Published on October 4, 2024
You’ve probably heard of encryption at some point. Encryption is a key technology in both business and consumer applications. Perhaps […]
Read What is Encryption?Tips for Securing Windows
Published on September 20, 2024
Many people use Microsoft Windows as their primary operating system for work, school, personal computing, and even gaming. The most […]
Read Tips for Securing WindowsThe Essential Role of Security Awareness Training in Safeguarding Our Campus Community
Published on July 15, 2024
In the ever-evolving digital landscape of higher education, the importance of security awareness cannot be overstated. Whether you’re a student […]
Read The Essential Role of Security Awareness Training in Safeguarding Our Campus CommunityStay Safe and Connected: The Importance of Reporting Incidents to OIT
Published on June 23, 2024
In today’s ultra-connected world, where technology is interwoven into every aspect of our lives, it’s essential to stay vigilant about […]
Read Stay Safe and Connected: The Importance of Reporting Incidents to OITStrengthening Information Security: Why It Matters
Published on May 31, 2024
In our interconnected world, safeguarding digital assets has become paramount. Let’s delve into the fundamental principles of cybersecurity and data […]
Read Strengthening Information Security: Why It MattersThe Importance of Keeping Your Web Browser Updated
Published on May 24, 2024
In today’s digital age, web browsers play a crucial role in our daily lives. Whether you’re shopping online, reading news […]
Read The Importance of Keeping Your Web Browser UpdatedThe Importance of Network Security: Keeping Our Devices Safe with MOD1
Published on May 3, 2024
As part of our ongoing security awareness program, we would like to share some important information about the safety of […]
Read The Importance of Network Security: Keeping Our Devices Safe with MOD1AI & Machine Learning Risks in Cybersecurity
Published on April 26, 2024
In an age where technology is evolving at breakneck speeds, artificial intelligence (AI) and machine learning (ML) have become integral […]
Read AI & Machine Learning Risks in CybersecurityWhy Avoid Shared Accounts?
Published on April 22, 2024
In our interconnected digital world, security is paramount. In keeping with our goal to provide the most secure environment possible we want […]
Read Why Avoid Shared Accounts?Incident Reporting and Response
Published on April 5, 2024
As part of our university’s commitment to fostering a safe and secure learning environment, we want to emphasize the importance […]
Read Incident Reporting and ResponseUnderstanding Zero-Day Vulnerabilities
Published on March 22, 2024
In the ever-evolving landscape of cybersecurity, staying informed about emerging threats is crucial. One such threat that deserves your attention […]
Read Understanding Zero-Day VulnerabilitiesUnderstanding Data Loss Prevention (DLP)
Published on March 15, 2024
Data loss prevention is all about protecting sensitive information from loss, corruption, misuse, or unauthorized access. Imagine it as a digital […]
Read Understanding Data Loss Prevention (DLP)The Importance of Password Managers: Safeguarding Your Digital Life
Published on March 1, 2024
In today’s interconnected world, we rely on countless online services, from banking, email, social media, to shopping. Each of these […]
Read The Importance of Password Managers: Safeguarding Your Digital LifeThe Importance of Installing Approved Software
Published on February 19, 2024
As we navigate the ever-evolving landscape of cybersecurity, it’s crucial for each member of our university to play an active […]
Read The Importance of Installing Approved SoftwareUnderstanding Acceptable Use Policies (AUPs)
Published on February 12, 2024
As a user of our computer systems, you might have come across the term Acceptable Use Policy (AUP) in your workplace. But […]
Read Understanding Acceptable Use Policies (AUPs)The Importance of Using Approved Anti-Malware Software on University Machines
Published on January 22, 2024
In the digital age, universities heavily rely on various software for administrative tasks, research, teaching, and learning. This reliance also […]
Read The Importance of Using Approved Anti-Malware Software on University MachinesCybersecurity and the Internet of Things
Published on December 13, 2023
Cybersecurity and the Internet of Things (IoT) The Internet of Things (IoT) is a term used to describe the network […]
Read Cybersecurity and the Internet of ThingsProtecting Your Digital World: Defeating MFA Fatigue
Published on October 13, 2023
Safeguarding your online accounts and sensitive information is more critical than ever. One powerful tool in your security arsenal is […]
Read Protecting Your Digital World: Defeating MFA FatigueThe Importance of Information Security
Published on August 28, 2023
Each week, we have a section in OIT Weekly about information security. We give tips and tricks to help you […]
Read The Importance of Information SecurityAvoid Social Media Mistakes
Published on August 21, 2023
We want to raise awareness about the potential dangers associated with social media usage. Cybercriminals often exploit personal information shared […]
Read Avoid Social Media MistakesCybercriminals and Barbie
Published on August 7, 2023
The Barbie movie grossed over $350 million at the box office this past weekend. With so many people invested in seeing this summer blockbuster, theaters […]
Read Cybercriminals and BarbieCall 800-Cybercriminal
Published on July 24, 2023
Recently, cybercriminals have taken advantage of Soda PDF, a PDF viewing service. Using Soda PDF, cybercriminals are sending malicious PDF files […]
Read Call 800-CybercriminalChatGPT
Published on June 19, 2023
ChatGPT, like anything else powered by artificial intelligence, comes with risks that need to be considered. A couple of key […]
Read ChatGPTCybercriminal at Your Door!
Published on March 27, 2023
Ring is a popular brand of security cameras designed for home safety. Unfortunately, Ring customers were the latest victims of […]
Read Cybercriminal at Your Door!Homoglyphs and Unicodes (No, not Unicorns)
Published on January 16, 2023
You may be wondering what homoglyphs and Unicodes are. Homoglyphs are letters or characters that look similar. For example, the […]
Read Homoglyphs and Unicodes (No, not Unicorns)If It Sounds Too Good to Be True…
Published on January 9, 2023
For years, cybercriminals have used social media to post fake sales listings for popular items such as furniture or electronics. […]
Read If It Sounds Too Good to Be True…Cryptocurrency
Published on November 29, 2022
Cryptocurrency exchange platforms allow you to buy and sell cryptocurrencies, such as Bitcoin. When you buy cryptocurrency, it’s stored in […]
Read CryptocurrencyExam time!
Published on November 21, 2022
Yes. I know that you just took your compliance training as it’s due to be completed before the end of […]
Read Exam time!Cybersecurity Awareness Month 2022
Published on October 9, 2022
All over the United States, people are observing “Cybersecurity Awareness Month” in October. That’s great! There is a WHOLE month […]
Read Cybersecurity Awareness Month 2022It’s the Simple Things
Published on October 3, 2022
The vast majority of cyberattacks, 98%, start with phishing attacks that contain NO zero-days and NO malware. They simply trick […]
Read It’s the Simple ThingsDon’t Become a victim!
Published on September 12, 2022
Here are a few facts that illustrate the dramatic increase in cybercrime; 2,244 cyberattacks happen daily, according to the University […]
Read Don’t Become a victim!No! Really! You are a target!
Published on September 7, 2022
Cybercriminals are very effective at getting what they want. They have learned that the easiest way around the university’s defenses […]
Read No! Really! You are a target!Security Terms
Published on August 24, 2022
As the school year gets underway, it is important to be vigilant when checking your email. There are a couple […]
Read Security TermsYou are the TARGET! (No…really…you ARE!)
Published on August 9, 2022
Over the summer, several students have fallen victim to phishing scams. Collectively, they have lost thousands of dollars from some […]
Read You are the TARGET! (No…really…you ARE!)Two-Factor Authentication (2FA) Prompt Bombing
Published on August 1, 2022
Two-factor authentication (also known as, “Multi-factor Authentication (MFA)”) provides an extra layer of security for your accounts, but it’s important to think […]
Read Two-Factor Authentication (2FA) Prompt BombingRISK – Why We Emphasize Information Security
Published on July 26, 2022
Information security is about addressing and reducing IT RISK. It’s easy to overlook risk as a topic when all you […]
Read RISK – Why We Emphasize Information SecurityCyber Security 101 — Insider Threats
Published on July 18, 2022
OIT receives many questions about cyber security, especially about what users can do to protect themselves. That is why we […]
Read Cyber Security 101 — Insider ThreatsConsidering Social Media Privacy
Published on July 18, 2022
Most people would never consider walking into a crowded room and loudly broadcasting to total strangers all the details of […]
Read Considering Social Media PrivacyContext is Everything!
Published on June 27, 2022
One definition of context is the circumstances that form the setting for an event, statement, or idea and in terms […]
Read Context is Everything!Cybersecurity…why?
Published on March 29, 2022
Passwords, two-factor, encryption, firewalls, phishing campaigns, and awareness training? How do these efforts “make us more secure?” Some may even […]
Read Cybersecurity…why?Events in Eastern Europe
Published on March 7, 2022
With recent events in the news, we know you have questions and concerns. One of those may be about cybersecurity. Am […]
Read Events in Eastern EuropeCyber Security 101 – Insider Threat
Published on February 28, 2022
OIT receives a lot of questions about cyber security, especially about what users can do to protect themselves. That is […]
Read Cyber Security 101 – Insider ThreatDon’t Be a Victim of Cyber Crime!
Published on February 13, 2022
The term “cybercrime” usually refers to any criminal offense committed against or with the use of a computer or computer […]
Read Don’t Be a Victim of Cyber Crime!There’s no security without “U”
Published on January 4, 2022
One of the biggest risks that we face is the loss of our data. Whether it is cyber-breach, a stolen […]
Read There’s no security without “U”Scam Types
Scams used to be easier to detect without worry. A Nigerian prince asks for a few hundred dollars to give you access to his fortune. But those days are gone, and scammers are in a constant arms race with cybersecurity for your sensitive information. Learn about the different types of scams and how to deal with them.
Understanding the National Public Data Breach: What It Means for You and How to Protect Yourself
Published on August 23, 2024
What Happened? Recently, National Public Data (NPD), a company that compiles public information for background checks, experienced a significant data […]
Read Understanding the National Public Data Breach: What It Means for You and How to Protect YourselfUnderstanding the Latest Cyber Threats
Published on August 12, 2024
As our digital landscape evolves, so do the tactics of cyber adversaries. It is crucial to stay informed on the […]
Read Understanding the Latest Cyber ThreatsTyposquatting: When a Tiny Typo Leads to Big Trouble
Published on August 4, 2024
Have you ever mistyped a website address? Maybe you accidentally hit “goggle.com” instead of “google.com”? Well, that seemingly innocent slip-up […]
Read Typosquatting: When a Tiny Typo Leads to Big TroubleNavigating the CrowdStrike Incident: What You Need to Know
Published on July 28, 2024
Recently, there was a hiccup in the digital security world. CrowdStrike, the company that keeps virtual doors locked at many […]
Read Navigating the CrowdStrike Incident: What You Need to KnowUnderstanding QR Code Phishing
Published on May 20, 2024
In the dynamic world of cybersecurity, threat actors continue to innovate with methods like QR code phishing. This technique, which […]
Read Understanding QR Code PhishingStrengthening Security: Lessons from Recent University Breaches
Published on April 5, 2024
As part of our ongoing commitment to cybersecurity, we want to share insights from recent security incidents affecting universities. The […]
Read Strengthening Security: Lessons from Recent University BreachesImportant Reminder: Beware of SMS Scams
Published on February 2, 2024
This week, we are writing to remind you of an ongoing issue that has been affecting some of our university […]
Read Important Reminder: Beware of SMS ScamsThe Importance of Using Approved Anti-Malware Software on University Machines
Published on January 22, 2024
In the digital age, universities heavily rely on various software for administrative tasks, research, teaching, and learning. This reliance also […]
Read The Importance of Using Approved Anti-Malware Software on University MachinesProtecting and Securing Your Personal and University Data on Your Phone
Published on January 12, 2024
Our smartphones have become a treasure trove of personal and professional data in the digital age. As members of a […]
Read Protecting and Securing Your Personal and University Data on Your PhoneTech Support Scams
Published on January 5, 2024
What are tech support scams? Tech support scams are a type of cybercrime that aims to trick users into believing […]
Read Tech Support ScamsIT Security: A Recent Real-World Attack
Published on December 8, 2023
In the ever-evolving landscape of IT security, it’s crucial to stay informed about recent attacks to understand the threats we […]
Read IT Security: A Recent Real-World AttackA Guide to Recognizing and Avoiding Scammers
Published on November 17, 2023
In a world where information is as valuable as currency, scammers have found fertile ground. With our reliance on technology, […]
Read A Guide to Recognizing and Avoiding ScammersProtecting Against Malware Concealed in PNG Images
Published on November 3, 2023
In our ongoing commitment to keeping our environment safe and secure, we bring to your attention a notable cybersecurity concern. […]
Read Protecting Against Malware Concealed in PNG ImagesBeware of Fake Update Pop-Ups: A Guide to Secure Your Online Experience
Published on October 27, 2023
We’ve all seen them — those pesky pop-up windows that appear when we visit a website, urging us to update […]
Read Beware of Fake Update Pop-Ups: A Guide to Secure Your Online ExperienceSafeguarding Against QR Code Fishing
Published on October 20, 2023
In the ever-evolving landscape of cybersecurity threats, one emerging tactic is the use of QR codes in phishing emails. This […]
Read Safeguarding Against QR Code FishingSafeguarding Against QR Code Fishing
Published on September 25, 2023
In the ever-evolving landscape of cybersecurity threats, one emerging tactic is the use of QR codes in phishing emails. This […]
Read Safeguarding Against QR Code FishingPhishing and Phishing and Phishing
Published on August 14, 2023
Cybercriminals know the best strategies for gaining access to the university’s sensitive data – Social Engineering. They simply manipulate your trust […]
Read Phishing and Phishing and Phishing.zip Domains
Published on July 31, 2023
Recently, .zip top-level domains have become available for public purchase. A top-level domain is the final section of a domain […]
Read .zip DomainsObscured, Obfuscated Links
Published on July 17, 2023
Recently, researchers have discovered another technique cybercriminals use to steal your information. In this technique, cybercriminals use obfuscated links to show IP addresses like XXX.XXX.XXX.XXX, […]
Read Obscured, Obfuscated LinksPhishing with Images
Published on July 10, 2023
Cybercriminals use images in phishing emails to impersonate real organizations. By using images like official logos (i.e., UT, UPS, FedEx, […]
Read Phishing with ImagesPretexting
Published on June 26, 2023
Now more than ever, cybercriminals are using a tactic known as pretexting to catch you off guard. Pretexting is when […]
Read PretextingPermission to Hack
Published on June 12, 2023
Malware researchers recently discovered a trojan app on the Google Play Store. Trojans are malicious applications or software that appear […]
Read Permission to HackPayPal Payment Ploy
Published on June 5, 2023
Recently, cybercriminals have taken advantage of the popular (and international) online payment platform, PayPal. Cybercriminals are spoofing PayPal to try […]
Read PayPal Payment PloySmishing for Bank Information
Published on May 22, 2023
A smishing attack(a phishing attack through SMS, or “text” messaging) was recently used by a ring of cybercriminals to steal […]
Read Smishing for Bank InformationWatch Out! FedNow Scams
Published on May 15, 2023
FedNow is a new instant payment service created by the Federal Reserve. This service allows banks from all over the […]
Read Watch Out! FedNow ScamsRansomware?
Published on May 8, 2023
Ransomware is malicious software, also known as malware, designed to encrypt files on a computer, making them unreadable. The creators […]
Read Ransomware?Linktree Scam
Published on May 1, 2023
Linktree is a landing page service where businesses and individuals can list multiple links from a single page. This service […]
Read Linktree ScamAI Phishbait
Published on April 24, 2023
intelligence (AI) has become increasingly popular in the past year. Many people have started using AI chatbots like ChatGPT or Google Bard. Unfortunately, cybercriminals are taking advantage of AI's popularity…
Read AI PhishbaitWatch Out for High Profile Scams
Published on April 10, 2023
The US-based Silicon Valley Bank (SVB) recently shut down due to failure to meet its financial obligations. This collapse has caused public panic, and unfortunately, like all major news events, cybercriminals…
Read Watch Out for High Profile ScamsKeep IT Private and Separate
Published on March 20, 2023
"YOU" exist in digital form all over the Internet. It is thus important to ensure that the "digital YOU" matches what you intend to share. It is also critical to…
Read Keep IT Private and SeparateThere was PHISHING. Then, there was SMISHING!
Published on February 23, 2023
A single sign-on (SSO) service allows you to log in to multiple accounts using one login credential, such as your […]
Read There was PHISHING. Then, there was SMISHING!Beware of Scams Related to Recent Earthquakes!
Published on February 20, 2023
Last week, two earthquakes occurred in Turkey and Syria. Unfortunately, cybercriminals often use crises to get your attention and manipulate […]
Read Beware of Scams Related to Recent Earthquakes!You broke Facebook??
Published on February 6, 2023
The latest social media scam is yet another phishing scheme designed to scare Facebook users into sharing their login credentials. […]
Read You broke Facebook??TikTok Filter Scams
Published on December 19, 2022
The social media app TikTok is famous for its creative audio and visual filters. TikTok adds and removes filters frequently, […]
Read TikTok Filter ScamsClone Phishing Scams
Published on December 5, 2022
The university and its departments often use email to send important information to faculty, staff, and students. If someone sends […]
Read Clone Phishing ScamsMalvertising
Published on November 2, 2022
What is “Malvertising”? Malvertising is the use of online advertising to spread malware. Malvertising involves injecting malicious or malware-laden advertisements […]
Read MalvertisingNews Related Scams
Published on September 27, 2022
Last week, news stories announced that Queen Elizabeth II, known for having the longest reign of any British monarch, passed […]
Read News Related ScamsZelle Fraud Alert
Published on September 26, 2022
Zelle is a popular mobile payment application that allows users to send payments to one another. Like most financial institutions, […]
Read Zelle Fraud AlertWhat is Vishing (Phone Phishing)?
Published on September 1, 2022
In a world of constant communication, cybercriminals can use various devices to reach your personal information. Email and computer users […]
Read What is Vishing (Phone Phishing)?How Do Cybercriminals Make an Email Sound so Authentic?
Published on May 31, 2022
Email or phone call scams are not new; cybercriminals have been attempting to fool people for years. Older scams like […]
Read How Do Cybercriminals Make an Email Sound so Authentic?What IS Social Engineering?
Published on April 12, 2022
Social engineering is the art of manipulating people, so they give up confidential information or take an action that could […]
Read What IS Social Engineering?Refuse the Bait!!
Published on February 23, 2022
Cybercriminals know the best strategies for gaining access to the University’s sensitive data. In most cases, it doesn’t involve them rappelling from […]
Read Refuse the Bait!!Benefits & Tips for You
In this section, you can learn about all the different tools available to you at UT, such as secure file sharing and monitoring your systems. We will also share best practices for staying secure at school and at home.
Tips for Securing Linux
Published on October 30, 2024
The third most popular operating system, Linux, is mostly unknown to the average person. However, Linux has been gaining popularity […]
Read Tips for Securing LinuxStay Safe Online When Using AI
Published on October 21, 2024
Continuing with National Cyber Security Awareness Month, a frankly unavoidable tool is AI. AI is becoming more integrated with computing systems […]
Read Stay Safe Online When Using AIReporting Cybercrime
Published on October 13, 2024
We all know that we should report any cyber incidents to the OIT HelpDesk and eventually OIT Security. This is […]
Read Reporting CybercrimeTips for Securing Windows
Published on September 20, 2024
Many people use Microsoft Windows as their primary operating system for work, school, personal computing, and even gaming. The most […]
Read Tips for Securing WindowsTips for Securing macOS
Published on September 13, 2024
It’s no surprise that macOS is the second-biggest operating system worldwide. Apple has a well-regulated array of computers available for […]
Read Tips for Securing macOSSecure Data Management: A Keystone of Cybersecurity
Published on July 3, 2024
In today’s interconnected world, managing data securely is not just a responsibility of the IT department; it’s a mission for […]
Read Secure Data Management: A Keystone of CybersecurityThe Essential Guide to Incident Response Planning
Published on June 28, 2024
In the digital age, where cyber threats are as common as they are diverse, one of the most critical aspects […]
Read The Essential Guide to Incident Response PlanningBoosting Security with Microsoft Defender
Published on June 17, 2024
In today’s digital landscape, security is paramount. We often rely on technology to protect us from cyber threats. One powerful […]
Read Boosting Security with Microsoft DefenderThe Importance of Password Rotation
Published on May 11, 2024
What is Password Rotation? Password rotation refers to the changing or resetting of passwords at regular intervals. The goal is […]
Read The Importance of Password RotationUnderstanding Zero-Day Vulnerabilities
Published on March 22, 2024
In the ever-evolving landscape of cybersecurity, staying informed about emerging threats is crucial. One such threat that deserves your attention […]
Read Understanding Zero-Day VulnerabilitiesUnderstanding Data Loss Prevention (DLP)
Published on March 15, 2024
Data loss prevention is all about protecting sensitive information from loss, corruption, misuse, or unauthorized access. Imagine it as a digital […]
Read Understanding Data Loss Prevention (DLP)MFA Fatigue: A Silent Threat to Your Security
Published on February 26, 2024
Multifactor Authentication (MFA) has become a crucial defense against cyber threats. By requiring users to provide multiple forms of identification, […]
Read MFA Fatigue: A Silent Threat to Your SecurityUnderstanding Acceptable Use Policies (AUPs)
Published on February 12, 2024
As a user of our computer systems, you might have come across the term Acceptable Use Policy (AUP) in your workplace. But […]
Read Understanding Acceptable Use Policies (AUPs)Enhancing Cybersecurity: A Guide to Browser Extensions
Published on January 26, 2024
Browser extensions are a great way to enhance your browsing experience but can pose a significant security risk. Cybercriminals frequently […]
Read Enhancing Cybersecurity: A Guide to Browser ExtensionsCybersecurity and the Internet of Things
Published on December 13, 2023
Cybersecurity and the Internet of Things (IoT) The Internet of Things (IoT) is a term used to describe the network […]
Read Cybersecurity and the Internet of ThingsUnderstanding Cybersecurity: A Glossary for Everyone
Published on December 1, 2023
In today’s digital age, understanding cybersecurity is not just for IT professionals but for everyone who uses the internet. Here […]
Read Understanding Cybersecurity: A Glossary for EveryoneA Guide to Recognizing and Avoiding Scammers
Published on November 17, 2023
In a world where information is as valuable as currency, scammers have found fertile ground. With our reliance on technology, […]
Read A Guide to Recognizing and Avoiding ScammersHoliday Cybersecurity Tips for Higher Education Users
Published on November 13, 2023
The holiday season is a time of joy and celebration, but it’s also a time when cybercriminals are on the […]
Read Holiday Cybersecurity Tips for Higher Education UsersA Guide to Secure File Sharing in Microsoft 365
Published on October 27, 2023
The modern workplace is more collaborative than ever, and digital file sharing has become an integral part of it. Microsoft […]
Read A Guide to Secure File Sharing in Microsoft 365Protecting Your Digital World: Defeating MFA Fatigue
Published on October 13, 2023
Safeguarding your online accounts and sensitive information is more critical than ever. One powerful tool in your security arsenal is […]
Read Protecting Your Digital World: Defeating MFA FatigueA Cyber Security Guide for Higher Ed
Published on October 6, 2023
What Students, Faculty, and Staff Need to Know October is a special month for online safety, especially for those of […]
Read A Cyber Security Guide for Higher EdSafeguarding Against QR Code Fishing
Published on September 25, 2023
In the ever-evolving landscape of cybersecurity threats, one emerging tactic is the use of QR codes in phishing emails. This […]
Read Safeguarding Against QR Code FishingSafeguarding Your Data in the Cloud: A Guide to Cloud Security
Published on September 20, 2023
In today’s digital age, cloud computing has become an integral part of how we store, access, and share data. Whether […]
Read Safeguarding Your Data in the Cloud: A Guide to Cloud SecuritySafeguarding Your Online Presence: A Guide to Secure Social Media Use
Published on September 18, 2023
In today’s interconnected world, social media has become integral to our daily lives. It’s a great way to stay in […]
Read Safeguarding Your Online Presence: A Guide to Secure Social Media UseSafeguarding Your Remote Work
Published on September 11, 2023
Remote work in higher education is now the norm. To keep your online work safe using university-provided tools like OneDrive […]
Read Safeguarding Your Remote WorkCompromised Workstations & Laptops
Published on April 3, 2023
An early nineteenth-century Prussian General stated, “No plan survives contact with the enemy.” President Eisenhower said, “…plans are useless, but planning is indispensable.” […]
Read Compromised Workstations & LaptopsIT or Cybercriminal?
Published on March 6, 2023
Coinbase, a cryptocurrency platform, is the latest victim of a social engineering attack. Social engineering occurs when cybercriminals manipulate you to try to steal your sensitive information. In this Coinbase…
Read IT or Cybercriminal?Tax Time!
Published on February 14, 2023
Do you know a cybercriminal’s favorite time of the year? It’s Tax season! Taxes are a sensitive topic that can easily catch […]
Read Tax Time!Spotting and Avoiding Phishing Attacks
Published on January 31, 2023
What is Phishing? Phishing is essentially someone trying to get you to do something through email, usually volunteer personal information […]
Read Spotting and Avoiding Phishing AttacksStudent Loan Relief Programs
Published on November 14, 2022
Our students need to be made aware of this scam, whether it’s through faculty or student services offered through our […]
Read Student Loan Relief ProgramsInformation Technology Resources
Published on November 7, 2022
This week, we call your attention to the importance of the Acceptable Use of Information Technology Resources Policy (“AUP”), IT0110. […]
Read Information Technology Resources4 Easy Steps to Stay Secure Online
Published on October 25, 2022
This October’s Cybersecurity Awareness Month theme is “See Yourself in Cyber.” It highlights how individuals, from everyday technology users to […]
Read 4 Easy Steps to Stay Secure OnlineSecurity Topic of the Week
Published on May 23, 2022
Is your workstation or laptop running slow? Does it take forever for an application to start? Do you return to your desk following […]
Read Security Topic of the WeekSteps for Staying Secure in These Scary Times
Published on April 26, 2022
As technology gains a more important role in our lives, it also grows in complexity. Given how quickly technology changes, […]
Read Steps for Staying Secure in These Scary TimesI’ve been hacked!
Published on February 7, 2022
Determining whether or not your computer or mobile device has been hacked can be difficult. Nonetheless, there are a few […]
Read I’ve been hacked!Ways to Spot a Scam
Published on January 24, 2022
Have you seen email or text messages that offer you lots of money for little to no work on your […]
Read Ways to Spot a ScamIt’s Tax season – Don’t be a victim!
Published on January 18, 2022
Its tax season, and soon, the W-2’s and associated forms will start circulating, which means we must be aware of tax […]
Read It’s Tax season – Don’t be a victim!Protecting University Data
Discover essential articles on cybersecurity practices specifically tailored for the University of Tennessee. Learn effective strategies to safeguard sensitive information, defend against threats, and maintain data integrity. Equip yourself with knowledge to protect your university’s digital ecosystem.
Secure File Transfer
Published on August 30, 2024
Vault (UT Secure Courier) is a secure file transfer application that allows users to easily share large files, including executables, […]
Read Secure File TransferProtecting University-Owned Devices from Infostealers
Published on August 16, 2024
In recent months, a surge in infostealer malware has been making headlines, posing a significant threat to individuals and organizations […]
Read Protecting University-Owned Devices from InfostealersProtecting Your Virtual Machines
Published on March 28, 2024
Many of us use virtual machines (VMs) on our computers these days for various reasons – to run an older […]
Read Protecting Your Virtual MachinesUnderstanding Data Loss Prevention (DLP)
Published on March 15, 2024
Data loss prevention is all about protecting sensitive information from loss, corruption, misuse, or unauthorized access. Imagine it as a digital […]
Read Understanding Data Loss Prevention (DLP)The Importance of Installing Approved Software
Published on February 19, 2024
As we navigate the ever-evolving landscape of cybersecurity, it’s crucial for each member of our university to play an active […]
Read The Importance of Installing Approved SoftwareUnderstanding Acceptable Use Policies (AUPs)
Published on February 12, 2024
As a user of our computer systems, you might have come across the term Acceptable Use Policy (AUP) in your workplace. But […]
Read Understanding Acceptable Use Policies (AUPs)Enhancing Cybersecurity: A Guide to Browser Extensions
Published on January 26, 2024
Browser extensions are a great way to enhance your browsing experience but can pose a significant security risk. Cybercriminals frequently […]
Read Enhancing Cybersecurity: A Guide to Browser ExtensionsCybersecurity and the Internet of Things
Published on December 13, 2023
Cybersecurity and the Internet of Things (IoT) The Internet of Things (IoT) is a term used to describe the network […]
Read Cybersecurity and the Internet of ThingsUnderstanding Cybersecurity: A Glossary for Everyone
Published on December 1, 2023
In today’s digital age, understanding cybersecurity is not just for IT professionals but for everyone who uses the internet. Here […]
Read Understanding Cybersecurity: A Glossary for EveryoneProtecting Against Malware Concealed in PNG Images
Published on November 3, 2023
In our ongoing commitment to keeping our environment safe and secure, we bring to your attention a notable cybersecurity concern. […]
Read Protecting Against Malware Concealed in PNG ImagesA Guide to Secure File Sharing in Microsoft 365
Published on October 27, 2023
The modern workplace is more collaborative than ever, and digital file sharing has become an integral part of it. Microsoft […]
Read A Guide to Secure File Sharing in Microsoft 365Safeguarding Your Data in the Cloud: A Guide to Cloud Security
Published on September 20, 2023
In today’s digital age, cloud computing has become an integral part of how we store, access, and share data. Whether […]
Read Safeguarding Your Data in the Cloud: A Guide to Cloud SecurityThe Importance of Information Security
Published on August 28, 2023
Each week, we have a section in OIT Weekly about information security. We give tips and tricks to help you […]
Read The Importance of Information SecuritySecurity Terms
Published on August 24, 2022
As the school year gets underway, it is important to be vigilant when checking your email. There are a couple […]
Read Security TermsAre My Documents Secure in the Cloud?
Published on June 20, 2022
With the increased use of cloud storage (Google Drive, Microsoft OneDrive, Dropbox, Evernote, etc.), individuals should take extra precautions to […]
Read Are My Documents Secure in the Cloud?Look, No Hands—Let OIT Continuously Monitor Your Systems
Published on June 13, 2022
One of the responsibilities of every user of UT’s IT resources is to continuously monitor their UT Owned workstations, laptops, and servers. What […]
Read Look, No Hands—Let OIT Continuously Monitor Your SystemsPlans and Programs and Controls, Oh My!
Published on June 6, 2022
Information security conversations often include words like “IT security plans,” “systems,” and “program plans.” What do these terms mean in […]
Read Plans and Programs and Controls, Oh My!File Sharing Options for Sensitive Information
Published on May 3, 2022
We regularly receive questions about sharing or storing sensitive information. While we have several recommendations, first, let’s talk about why […]
Read File Sharing Options for Sensitive InformationIncident what?
Published on April 19, 2022
Information Security type individuals, as well as auditors, frequently talk about “Incident Response.” The term gets mentioned so much that […]
Read Incident what?Compromised Workstations/Laptops
Published on April 4, 2022
Is your workstation or laptop running “slow”? Does it take FOREVER for an application to start? Do you come in […]
Read Compromised Workstations/LaptopsData Loss Prevention (DLP)
Published on March 15, 2022
One of the biggest risks that we face is the loss of our data. Whether it is cyber-breach, a stolen mobile device, […]
Read Data Loss Prevention (DLP)Phishing Ourselves
Published on January 10, 2022
In September of 2021, the UTK Administration asked that OIT develop and carry out a phishing campaign. The phishing will […]
Read Phishing Ourselves