Skip to content Skip to main navigation Report an accessibility issue
Information Security

Learning Library



Check for Recent Email Scams

Email scams are an ever-evolving threat in this digital world. It can be hard to tell what is real and what is the latest bit of social engineering. Cross check suspicious emails at the Status Center! We log recently reported scams in the UT email ecosystem that you can compare your email to. Stay informed!

Importance of Security

Read about why YOU should care about security and what we are doing to keep your data safe.

Scam Types

Arm yourself with the knowledge of how these scams work

Benefits & Tips for You

A collection of actions YOU can take to keep yourself safe from different types of malicious intent.

Protecting University Data

Learn how to protect university data by managing systems and applications responsibly.

Terms & Glossary

There is a lot of jargon when discussing security. Here is a glossary to help break it down.

Security News

Stay up to date on news happening in the cybersecurity world

Recent Articles

View all articles

Understanding Cybersecurity: A Glossary for Everyone

Published on December 1, 2023

In today’s digital age, understanding cybersecurity is not just for IT professionals but for everyone who uses the internet. Here […]

ReadUnderstanding Cybersecurity: A Glossary for Everyone

A Guide to Recognizing and Avoiding Scammers

Published on November 17, 2023

In a world where information is as valuable as currency, scammers have found fertile ground. With our reliance on technology, […]

ReadA Guide to Recognizing and Avoiding Scammers

Holiday Cybersecurity Tips for Higher Education Users

Published on November 13, 2023

The holiday season is a time of joy and celebration, but it’s also a time when cybercriminals are on the […]

ReadHoliday Cybersecurity Tips for Higher Education Users

Protecting Against Malware Concealed in PNG Images

Published on November 3, 2023

In our ongoing commitment to keeping our environment safe and secure, we bring to your attention a notable cybersecurity concern. […]

ReadProtecting Against Malware Concealed in PNG Images