Skip to content Skip to main navigation Report an accessibility issue
Information Security

Learning Library



Check for Recent Email Scams

Email scams are an ever-evolving threat in this digital world. It can be hard to tell what is real and what is the latest bit of social engineering. Cross check suspicious emails at the Status Center! We log recently reported scams in the UT email ecosystem that you can compare your email to. Stay informed!

Importance of Security

Read about why YOU should care about security and what we are doing to keep your data safe.

Scam Types

Arm yourself with the knowledge of how these scams work

Benefits & Tips for You

A collection of actions YOU can take to keep yourself safe from different types of malicious intent.

Protecting University Data

Learn how to protect university data by managing systems and applications responsibly.

Terms & Glossary

There is a lot of jargon when discussing security. Here is a glossary to help break it down.

Security News

Stay up to date on news happening in the cybersecurity world

Recent Articles

View all articles

The Importance of Password Managers: Safeguarding Your Digital Life 

Published on March 1, 2024

In today’s interconnected world, we rely on countless online services, from banking, email, social media, to shopping. Each of these […]

ReadThe Importance of Password Managers: Safeguarding Your Digital Life 

MFA Fatigue: A Silent Threat to Your Security

Published on February 26, 2024

Multifactor Authentication (MFA) has become a crucial defense against cyber threats. By requiring users to provide multiple forms of identification, […]

ReadMFA Fatigue: A Silent Threat to Your Security

The Importance of Installing Approved Software

Published on February 19, 2024

As we navigate the ever-evolving landscape of cybersecurity, it’s crucial for each member of our university to play an active […]

ReadThe Importance of Installing Approved Software

Understanding Acceptable Use Policies (AUPs)

Published on February 12, 2024

As a user of our computer systems, you might have come across the term Acceptable Use Policy (AUP) in your workplace. But […]

ReadUnderstanding Acceptable Use Policies (AUPs)