Skip to content Skip to main navigation Report an accessibility issue
Information Security

Learning Library



Check for Recent Email Scams

Email scams are an ever-evolving threat in this digital world. It can be hard to tell what is real and what is the latest bit of social engineering. Cross check suspicious emails at the Status Center! We log recently reported scams in the UT email ecosystem that you can compare your email to. Stay informed!

Importance of Security

Read about why YOU should care about security and what we are doing to keep your data safe.

Scam Types

Arm yourself with the knowledge of how these scams work

Benefits & Tips for You

A collection of actions YOU can take to keep yourself safe from different types of malicious intent.

Protecting University Data

Learn how to protect university data by managing systems and applications responsibly.

Terms & Glossary

There is a lot of jargon when discussing security. Here is a glossary to help break it down.

Security News

Stay up to date on news happening in the cybersecurity world

Recent Articles

View all articles

AI & Machine Learning Risks in Cybersecurity 

Published on April 26, 2024

In an age where technology is evolving at breakneck speeds, artificial intelligence (AI) and machine learning (ML) have become integral […]

ReadAI & Machine Learning Risks in Cybersecurity 

Why Avoid Shared Accounts?

Published on April 22, 2024

In our interconnected digital world, security is paramount. In keeping with our goal to provide the most secure environment possible we want […]

ReadWhy Avoid Shared Accounts?

Incident Reporting and Response

Published on April 5, 2024

As part of our university’s commitment to fostering a safe and secure learning environment, we want to emphasize the importance […]

ReadIncident Reporting and Response

Strengthening Security: Lessons from Recent University Breaches

Published on April 5, 2024

As part of our ongoing commitment to cybersecurity, we want to share insights from recent security incidents affecting universities. The […]

ReadStrengthening Security: Lessons from Recent University Breaches