Skip to content Skip to main navigation Report an accessibility issue
Information Security

Learning Library



Check for Recent Email Scams

Email scams are an ever-evolving threat in this digital world. It can be hard to tell what’s real and what’s the latest bit of social engineering. Cross-check suspicious emails at the Recent Email Scams page! We log recently reported scams in the UT email ecosystem that you can compare your email to. Stay informed!

Importance of Security

Read about why YOU should care about security and what we are doing to keep your data safe.

Read more about Security

Scam Types

Arm yourself with the knowledge of how these scams work

Read more about Scam Types

Benefits & Tips for You

A collection of actions YOU can take to keep yourself safe from different types of malicious intent.

Read more about Benefits

Protecting University Data

Learn how to protect university data by managing systems and applications responsibly.

Read more about Protecting Data

Terms & Glossary

There is a lot of jargon when discussing security. Here is a glossary to help break it down.

Read the Glossary

Security News

Stay up to date on news happening in the cybersecurity world

Read Security News

Recent Articles

View all articles

The Importance of Password Rotation

Published on February 13, 2026

Password rotation is the periodic changing or resetting of passwords. The goal is to limit a password’s lifespan to reduce […]

ReadThe Importance of Password Rotation

Obscured, Obfuscated Links

Published on February 6, 2026

Recently, researchers have discovered another technique cybercriminals use to steal your information. In this technique, cybercriminals use obfuscated links to show IP addresses like XXX.XXX.XXX.XXX, […]

ReadObscured, Obfuscated Links

Two-Factor Authentication (2FA) Prompt Bombing

Published on January 23, 2026

Two-factor authentication (also known as, “Multi-factor Authentication (MFA)”) provides an extra layer of security for your accounts, but it’s important to think […]

ReadTwo-Factor Authentication (2FA) Prompt Bombing

When ‘Too Good to Be True’ Comes from Someone You Know

Published on December 5, 2025

For years, cybercriminals have used social media to post fake sales listings for popular items such as furniture or electronics. […]

ReadWhen ‘Too Good to Be True’ Comes from Someone You Know