Skip to content Skip to main navigation Report an accessibility issue
Information Security

Learning Library



Check for Recent Email Scams

Email scams are an ever-evolving threat in this digital world. It can be hard to tell what’s real and what’s the latest bit of social engineering. Cross-check suspicious emails at the Recent Email Scams page! We log recently reported scams in the UT email ecosystem that you can compare your email to. Stay informed!

Security Learning Icon One

Importance of Security

Read about why YOU should care about security and what we are doing to keep your data safe.

Read more about Security

Scam Types Image

Scam Types

Arm yourself with the knowledge of how these scams work

Read more about Scam Types

Benefits & Tips for You Image

Benefits & Tips for You

A collection of actions YOU can take to keep yourself safe from different types of malicious intent.

Read more about Benefits

Security Learning Icon

Protecting University Data

Learn how to protect university data by managing systems and applications responsibly.

Read more about Protecting Data

Terms & Glossary Image

Terms & Glossary

There is a lot of jargon when discussing security. Here is a glossary to help break it down.

Read the Glossary

Security News Image

Security News

Stay up to date on news happening in the cybersecurity world

Read Security News

Recent Articles

View all articles

Spotting and Avoiding Phishing Attacks

Published on February 19, 2026

Phishing is essentially someone trying to get you to do something via email, usually by asking you to volunteer personal […]

ReadSpotting and Avoiding Phishing Attacks

The Importance of Password Rotation

Published on February 13, 2026

Password rotation is the periodic changing or resetting of passwords. The goal is to limit a password’s lifespan to reduce […]

ReadThe Importance of Password Rotation

Obscured, Obfuscated Links

Published on February 6, 2026

Recently, researchers have discovered another technique cybercriminals use to steal your information. In this technique, cybercriminals use obfuscated links to show IP addresses like XXX.XXX.XXX.XXX, […]

ReadObscured, Obfuscated Links

Two-Factor Authentication (2FA) Prompt Bombing

Published on January 23, 2026

Two-factor authentication (also known as, “Multi-factor Authentication (MFA)”) provides an extra layer of security for your accounts, but it’s important to think […]

ReadTwo-Factor Authentication (2FA) Prompt Bombing