Skip to content Skip to main navigation Report an accessibility issue
Information Security

Learning Library



Check for Recent Email Scams

Email scams are an ever-evolving threat in this digital world. It can be hard to tell what’s real and what’s the latest bit of social engineering. Cross-check suspicious emails at the Recent Email Scams page! We log recently reported scams in the UT email ecosystem that you can compare your email to. Stay informed!

Importance of Security

Read about why YOU should care about security and what we are doing to keep your data safe.

Read More

Scam Types

Arm yourself with the knowledge of how these scams work

Read More

Benefits & Tips for You

A collection of actions YOU can take to keep yourself safe from different types of malicious intent.

Read More

Protecting University Data

Learn how to protect university data by managing systems and applications responsibly.

Read More

Terms & Glossary

There is a lot of jargon when discussing security. Here is a glossary to help break it down.

Read More

Security News

Stay up to date on news happening in the cybersecurity world

Read More

Recent Articles

View all articles

Phishing and Phishing and Phishing

Published on November 14, 2025

Cybercriminals know the best strategies for gaining access to the university’s sensitive data – Social Engineering. They simply manipulate your trust […]

ReadPhishing and Phishing and Phishing

Tech Support Scams

Published on November 10, 2025

What are tech support scams? Tech support scams are a type of cybercrime that aims to trick users into believing […]

ReadTech Support Scams

Agentic AI Browsers and Associated Risks

Published on November 3, 2025

Unlike traditional browsers, which rely on user clicks and keystrokes, Agentic AI browsers integrate autonomous agents into the browsing experience. […]

ReadAgentic AI Browsers and Associated Risks

Compelling Reason to Lock Your Screen

Published on October 23, 2025

It only takes a few seconds for someone to access your computer, and that’s all it takes to compromise sensitive […]

ReadCompelling Reason to Lock Your Screen