Skip to content Skip to main navigation Report an accessibility issue
Information Security

Article Archive



Importance of Security

Information security is about addressing and reducing IT RISK. It’s easy to overlook risk as a topic when all you hear is talk about passwords, firewalls, encryption, policies, or two-factor authentication. In this section, you’ll read about how the university is at risk and what you can do to reduce the risk in your group, department, and college.

The Importance of Password Managers: Safeguarding Your Digital Life 

Published on March 1, 2024

In today’s interconnected world, we rely on countless online services, from banking, email, social media, to shopping. Each of these […]

Read The Importance of Password Managers: Safeguarding Your Digital Life 

The Importance of Installing Approved Software

Published on February 19, 2024

As we navigate the ever-evolving landscape of cybersecurity, it’s crucial for each member of our university to play an active […]

Read The Importance of Installing Approved Software
View All

Understanding Acceptable Use Policies (AUPs)

Published on February 12, 2024

As a user of our computer systems, you might have come across the term Acceptable Use Policy (AUP) in your workplace. But […]

Read Understanding Acceptable Use Policies (AUPs)

The Importance of Using Approved Anti-Malware Software on University Machines

Published on January 22, 2024

In the digital age, universities heavily rely on various software for administrative tasks, research, teaching, and learning. This reliance also […]

Read The Importance of Using Approved Anti-Malware Software on University Machines

Cybersecurity and the Internet of Things

Published on December 13, 2023

Cybersecurity and the Internet of Things (IoT) The Internet of Things (IoT) is a term used to describe the network […]

Read Cybersecurity and the Internet of Things

Safeguarding Against QR Code Fishing

Published on October 20, 2023

In the ever-evolving landscape of cybersecurity threats, one emerging tactic is the use of QR codes in phishing emails. This […]

Read Safeguarding Against QR Code Fishing

Protecting Your Digital World: Defeating MFA Fatigue

Published on October 13, 2023

Safeguarding your online accounts and sensitive information is more critical than ever. One powerful tool in your security arsenal is […]

Read Protecting Your Digital World: Defeating MFA Fatigue

The Importance of Information Security

Published on August 28, 2023

Each week, we have a section in OIT Weekly about information security.  We give tips and tricks to help you […]

Read The Importance of Information Security

Avoid Social Media Mistakes

Published on August 21, 2023

We want to raise awareness about the potential dangers associated with social media usage. Cybercriminals often exploit personal information shared […]

Read Avoid Social Media Mistakes

Cybercriminals and Barbie

Published on August 7, 2023

The Barbie movie grossed over $350 million at the box office this past weekend. With so many people invested in seeing this summer blockbuster, theaters […]

Read Cybercriminals and Barbie

Call 800-Cybercriminal

Published on July 24, 2023

Recently, cybercriminals have taken advantage of Soda PDF, a PDF viewing service. Using Soda PDF, cybercriminals are sending malicious PDF files […]

Read Call 800-Cybercriminal

ChatGPT

Published on June 19, 2023

ChatGPT, like anything else powered by artificial intelligence, comes with risks that need to be considered. A couple of key […]

Read ChatGPT

Cybercriminal at Your Door!

Published on March 27, 2023

Ring is a popular brand of security cameras designed for home safety. Unfortunately, Ring customers were the latest victims of […]

Read Cybercriminal at Your Door!

Homoglyphs and Unicodes (No, not Unicorns)

Published on January 16, 2023

You may be wondering what homoglyphs and Unicodes are. Homoglyphs are letters or characters that look similar. For example, the […]

Read Homoglyphs and Unicodes (No, not Unicorns)

If It Sounds Too Good to Be True…

Published on January 9, 2023

For years, cybercriminals have used social media to post fake sales listings for popular items such as furniture or electronics. […]

Read If It Sounds Too Good to Be True…

Cryptocurrency

Published on November 29, 2022

Cryptocurrency exchange platforms allow you to buy and sell cryptocurrencies, such as Bitcoin. When you buy cryptocurrency, it’s stored in […]

Read Cryptocurrency

Exam time!

Published on November 21, 2022

Yes. I know that you just took your compliance training as it’s due to be completed before the end of […]

Read Exam time!

Passwords, Passwords Everywhere!

Published on October 19, 2022

Did you know that the average person uses the same three to seven passwords to log in to over 170 […]

Read Passwords, Passwords Everywhere!

Cybersecurity Awareness Month 2022

Published on October 9, 2022

All over the United States, people are observing “Cybersecurity Awareness Month” in October. That’s great! There is a WHOLE month […]

Read Cybersecurity Awareness Month 2022

It’s the Simple Things

Published on October 3, 2022

The vast majority of cyberattacks, 98%, start with phishing attacks that contain NO zero-days and NO malware. They simply trick […]

Read It’s the Simple Things

Don’t Become a victim!

Published on September 12, 2022

Here are a few facts that illustrate the dramatic increase in cybercrime; 2,244 cyberattacks happen daily, according to the University […]

Read Don’t Become a victim!

No! Really! You are a target!

Published on September 7, 2022

Cybercriminals are very effective at getting what they want. They have learned that the easiest way around the university’s defenses […]

Read No! Really! You are a target!

Security Terms

Published on August 24, 2022

As the school year gets underway, it is important to be vigilant when checking your email. There are a couple […]

Read Security Terms

You are the TARGET! (No…really…you ARE!)

Published on August 9, 2022

Over the summer, several students have fallen victim to phishing scams. Collectively, they have lost thousands of dollars from some […]

Read You are the TARGET! (No…really…you ARE!)

Two-Factor Authentication (2FA) Prompt Bombing

Published on August 1, 2022

Two-factor authentication (also known as, “Multi-factor Authentication (MFA)”) provides an extra layer of security for your accounts, but it’s important to think […]

Read Two-Factor Authentication (2FA) Prompt Bombing

RISK – Why We Emphasize Information Security

Published on July 26, 2022

Information security is about addressing and reducing IT RISK. It’s easy to overlook risk as a topic when all you […]

Read RISK – Why We Emphasize Information Security

Cyber Security 101 — Insider Threats

Published on July 18, 2022

OIT receives many questions about cyber security, especially about what users can do to protect themselves. That is why we […]

Read Cyber Security 101 — Insider Threats

Considering Social Media Privacy

Published on July 18, 2022

Most people would never consider walking into a crowded room and loudly broadcasting to total strangers all the details of […]

Read Considering Social Media Privacy

Context is Everything! 

Published on June 27, 2022

One definition of context is the circumstances that form the setting for an event, statement, or idea and in terms […]

Read Context is Everything! 

Cybersecurity…why?

Published on March 29, 2022

Passwords, two-factor, encryption, firewalls, phishing campaigns, and awareness training? How do these efforts “make us more secure?” Some may even […]

Read Cybersecurity…why?

Events in Eastern Europe

Published on March 7, 2022

With recent events in the news, we know you have questions and concerns. One of those may be about cybersecurity. Am […]

Read Events in Eastern Europe

Cyber Security 101 – Insider Threat

Published on February 28, 2022

OIT receives a lot of questions about cyber security, especially about what users can do to protect themselves. That is […]

Read Cyber Security 101 – Insider Threat

Don’t Be a Victim of Cyber Crime!

Published on February 13, 2022

The term “cybercrime” usually refers to any criminal offense committed against or with the use of a computer or computer […]

Read Don’t Be a Victim of Cyber Crime!

There’s no security without “U”

Published on January 4, 2022

One of the biggest risks that we face is the loss of our data. Whether it is cyber-breach, a stolen […]

Read There’s no security without “U”

Scam Types

Scams used to be easier to detect without worry. A Nigerian prince asks for a few hundred dollars to give you access to his fortune. But those days are gone, and scammers are in a constant arms race with cybersecurity for your sensitive information. Learn about the different types of scams and how to deal with them.

Important Reminder: Beware of SMS Scams

Published on February 2, 2024

This week, we are writing to remind you of an ongoing issue that has been affecting some of our university […]

Read Important Reminder: Beware of SMS Scams

Protecting and Securing Your Personal and University Data on Your Phone

Published on January 12, 2024

Our smartphones have become a treasure trove of personal and professional data in the digital age. As members of a […]

Read Protecting and Securing Your Personal and University Data on Your Phone
View All

Tech Support Scams

Published on January 5, 2024

What are tech support scams? Tech support scams are a type of cybercrime that aims to trick users into believing […]

Read Tech Support Scams

A Guide to Recognizing and Avoiding Scammers

Published on November 17, 2023

In a world where information is as valuable as currency, scammers have found fertile ground. With our reliance on technology, […]

Read A Guide to Recognizing and Avoiding Scammers

Protecting Against Malware Concealed in PNG Images

Published on November 3, 2023

In our ongoing commitment to keeping our environment safe and secure, we bring to your attention a notable cybersecurity concern. […]

Read Protecting Against Malware Concealed in PNG Images

Beware of Fake Update Pop-Ups: A Guide to Secure Your Online Experience

Published on October 27, 2023

We’ve all seen them — those pesky pop-up windows that appear when we visit a website, urging us to update […]

Read Beware of Fake Update Pop-Ups: A Guide to Secure Your Online Experience

Safeguarding Against QR Code Fishing

Published on October 20, 2023

In the ever-evolving landscape of cybersecurity threats, one emerging tactic is the use of QR codes in phishing emails. This […]

Read Safeguarding Against QR Code Fishing

Safeguarding Against QR Code Fishing

Published on September 25, 2023

In the ever-evolving landscape of cybersecurity threats, one emerging tactic is the use of QR codes in phishing emails. This […]

Read Safeguarding Against QR Code Fishing

Phishing and Phishing and Phishing

Published on August 14, 2023

Cybercriminals know the best strategies for gaining access to the university’s sensitive data – Social Engineering. They simply manipulate your trust […]

Read Phishing and Phishing and Phishing

.zip Domains 

Published on July 31, 2023

Recently, .zip top-level domains have become available for public purchase. A top-level domain is the final section of a domain […]

Read .zip Domains 

Obscured, Obfuscated Links

Published on July 17, 2023

Recently, researchers have discovered another technique cybercriminals use to steal your information. In this technique, cybercriminals use obfuscated links to show IP addresses like XXX.XXX.XXX.XXX, […]

Read Obscured, Obfuscated Links

Phishing with Images

Published on July 10, 2023

Cybercriminals use images in phishing emails to impersonate real organizations. By using images like official logos (i.e., UT, UPS, FedEx, […]

Read Phishing with Images

Pretexting

Published on June 26, 2023

Now more than ever, cybercriminals are using a tactic known as pretexting to catch you off guard. Pretexting is when […]

Read Pretexting

Permission to Hack

Published on June 12, 2023

Malware researchers recently discovered a trojan app on the Google Play Store. Trojans are malicious applications or software that appear […]

Read Permission to Hack

PayPal Payment Ploy

Published on June 5, 2023

Recently, cybercriminals have taken advantage of the popular (and international) online payment platform, PayPal. Cybercriminals are spoofing PayPal to try […]

Read PayPal Payment Ploy

Smishing for Bank Information 

Published on May 22, 2023

A smishing attack(a phishing attack through SMS, or “text” messaging) was recently used by a ring of cybercriminals to steal […]

Read Smishing for Bank Information 

Watch Out! FedNow Scams

Published on May 15, 2023

FedNow is a new instant payment service created by the Federal Reserve. This service allows banks from all over the […]

Read Watch Out! FedNow Scams

Ransomware?

Published on May 8, 2023

Ransomware is malicious software, also known as malware, designed to encrypt files on a computer, making them unreadable. The creators […]

Read Ransomware?

Linktree Scam

Published on May 1, 2023

Linktree is a landing page service where businesses and individuals can list multiple links from a single page. This service […]

Read Linktree Scam

AI Phishbait

Published on April 24, 2023

intelligence (AI) has become increasingly popular in the past year. Many people have started using AI chatbots like ChatGPT or Google Bard. Unfortunately, cybercriminals are taking advantage of AI's popularity…

Read AI Phishbait

Watch Out for High Profile Scams

Published on April 10, 2023

The US-based Silicon Valley Bank (SVB) recently shut down due to failure to meet its financial obligations. This collapse has caused public panic, and unfortunately, like all major news events, cybercriminals…

Read Watch Out for High Profile Scams

Keep IT Private and Separate

Published on March 20, 2023

"YOU" exist in digital form all over the Internet. It is thus important to ensure that the "digital YOU" matches what you intend to share. It is also critical to…

Read Keep IT Private and Separate

There was PHISHING. Then, there was SMISHING!

Published on February 23, 2023

A single sign-on (SSO) service allows you to log in to multiple accounts using one login credential, such as your […]

Read There was PHISHING. Then, there was SMISHING!

Beware of Scams Related to Recent Earthquakes!

Published on February 20, 2023

Last week, two earthquakes occurred in Turkey and Syria. Unfortunately, cybercriminals often use crises to get your attention and manipulate […]

Read Beware of Scams Related to Recent Earthquakes!

You broke Facebook?? 

Published on February 6, 2023

The latest social media scam is yet another phishing scheme designed to scare Facebook users into sharing their login credentials. […]

Read You broke Facebook?? 

TikTok Filter Scams

Published on December 19, 2022

The social media app TikTok is famous for its creative audio and visual filters. TikTok adds and removes filters frequently, […]

Read TikTok Filter Scams

Clone Phishing Scams

Published on December 5, 2022

The university and its departments often use email to send important information to faculty, staff, and students. If someone sends […]

Read Clone Phishing Scams

Malvertising

Published on November 2, 2022

What is “Malvertising”? Malvertising is the use of online advertising to spread malware. Malvertising involves injecting malicious or malware-laden advertisements […]

Read Malvertising

News Related Scams

Published on September 27, 2022

Last week, news stories announced that Queen Elizabeth II, known for having the longest reign of any British monarch, passed […]

Read News Related Scams

Zelle Fraud Alert

Published on September 26, 2022

Zelle is a popular mobile payment application that allows users to send payments to one another. Like most financial institutions, […]

Read Zelle Fraud Alert

What is Vishing (Phone Phishing)? 

Published on September 1, 2022

In a world of constant communication, cybercriminals can use various devices to reach your personal information. Email and computer users […]

Read What is Vishing (Phone Phishing)? 

How Do Cybercriminals Make an Email Sound so Authentic?

Published on May 31, 2022

Email or phone call scams are not new; cybercriminals have been attempting to fool people for years. Older scams like […]

Read How Do Cybercriminals Make an Email Sound so Authentic?

What IS Social Engineering?

Published on April 12, 2022

Social engineering is the art of manipulating people, so they give up confidential information or take an action that could […]

Read What IS Social Engineering?

Refuse the Bait!!

Published on February 23, 2022

Cybercriminals know the best strategies for gaining access to the University’s sensitive data. In most cases, it doesn’t involve them rappelling from […]

Read Refuse the Bait!!

Benefits & Tips for You

In this section, you can learn about all the different tools available to you at UT, such as secure file sharing and monitoring your systems. We will also share best practices for staying secure at school and at home.

MFA Fatigue: A Silent Threat to Your Security

Published on February 26, 2024

Multifactor Authentication (MFA) has become a crucial defense against cyber threats. By requiring users to provide multiple forms of identification, […]

Read MFA Fatigue: A Silent Threat to Your Security

Understanding Acceptable Use Policies (AUPs)

Published on February 12, 2024

As a user of our computer systems, you might have come across the term Acceptable Use Policy (AUP) in your workplace. But […]

Read Understanding Acceptable Use Policies (AUPs)
View All

Enhancing Cybersecurity: A Guide to Browser Extensions

Published on January 26, 2024

Browser extensions are a great way to enhance your browsing experience but can pose a significant security risk. Cybercriminals frequently […]

Read Enhancing Cybersecurity: A Guide to Browser Extensions

Cybersecurity and the Internet of Things

Published on December 13, 2023

Cybersecurity and the Internet of Things (IoT) The Internet of Things (IoT) is a term used to describe the network […]

Read Cybersecurity and the Internet of Things

Understanding Cybersecurity: A Glossary for Everyone

Published on December 1, 2023

In today’s digital age, understanding cybersecurity is not just for IT professionals but for everyone who uses the internet. Here […]

Read Understanding Cybersecurity: A Glossary for Everyone

A Guide to Recognizing and Avoiding Scammers

Published on November 17, 2023

In a world where information is as valuable as currency, scammers have found fertile ground. With our reliance on technology, […]

Read A Guide to Recognizing and Avoiding Scammers

Holiday Cybersecurity Tips for Higher Education Users

Published on November 13, 2023

The holiday season is a time of joy and celebration, but it’s also a time when cybercriminals are on the […]

Read Holiday Cybersecurity Tips for Higher Education Users

A Guide to Secure File Sharing in Microsoft 365 

Published on October 27, 2023

The modern workplace is more collaborative than ever, and digital file sharing has become an integral part of it. Microsoft […]

Read A Guide to Secure File Sharing in Microsoft 365 

Protecting Your Digital World: Defeating MFA Fatigue

Published on October 13, 2023

Safeguarding your online accounts and sensitive information is more critical than ever. One powerful tool in your security arsenal is […]

Read Protecting Your Digital World: Defeating MFA Fatigue

A Cyber Security Guide for Higher Ed

Published on October 6, 2023

What Students, Faculty, and Staff Need to Know October is a special month for online safety, especially for those of […]

Read A Cyber Security Guide for Higher Ed

Safeguarding Against QR Code Fishing

Published on September 25, 2023

In the ever-evolving landscape of cybersecurity threats, one emerging tactic is the use of QR codes in phishing emails. This […]

Read Safeguarding Against QR Code Fishing

Safeguarding Your Data in the Cloud: A Guide to Cloud Security

Published on September 20, 2023

In today’s digital age, cloud computing has become an integral part of how we store, access, and share data. Whether […]

Read Safeguarding Your Data in the Cloud: A Guide to Cloud Security

Safeguarding Your Online Presence: A Guide to Secure Social Media Use

Published on September 18, 2023

In today’s interconnected world, social media has become integral to our daily lives. It’s a great way to stay in […]

Read Safeguarding Your Online Presence: A Guide to Secure Social Media Use

Safeguarding Your Remote Work

Published on September 11, 2023

Remote work in higher education is now the norm. To keep your online work safe using university-provided tools like OneDrive […]

Read Safeguarding Your Remote Work

Compromised Workstations & Laptops

Published on April 3, 2023

An early nineteenth-century Prussian General stated, “No plan survives contact with the enemy.” President Eisenhower said, “…plans are useless, but planning is indispensable.” […]

Read Compromised Workstations & Laptops

IT or Cybercriminal?

Published on March 6, 2023

Coinbase, a cryptocurrency platform, is the latest victim of a social engineering attack. Social engineering occurs when cybercriminals manipulate you to try to steal your sensitive information.  In this Coinbase…

Read IT or Cybercriminal?

Tax Time!

Published on February 14, 2023

Do you know a cybercriminal’s favorite time of the year? It’s Tax season! Taxes are a sensitive topic that can easily catch […]

Read Tax Time!

Spotting and Avoiding Phishing Attacks

Published on January 31, 2023

What is Phishing? Phishing is essentially someone trying to get you to do something through email, usually volunteer personal information […]

Read Spotting and Avoiding Phishing Attacks

Student Loan Relief Programs

Published on November 14, 2022

Our students need to be made aware of this scam, whether it’s through faculty or student services offered through our […]

Read Student Loan Relief Programs

Information Technology Resources

Published on November 7, 2022

This week, we call your attention to the importance of the Acceptable Use of Information Technology Resources Policy (“AUP”), IT0110. […]

Read Information Technology Resources

4 Easy Steps to Stay Secure Online

Published on October 25, 2022

This October’s Cybersecurity Awareness Month theme is “See Yourself in Cyber.” It highlights how individuals, from everyday technology users to […]

Read 4 Easy Steps to Stay Secure Online

Security Topic of the Week

Published on May 23, 2022

Is your workstation or laptop running slow? Does it take forever for an application to start? Do you return to your desk following […]

Read Security Topic of the Week

Steps for Staying Secure in These Scary Times

Published on April 26, 2022

As technology gains a more important role in our lives, it also grows in complexity. Given how quickly technology changes, […]

Read Steps for Staying Secure in These Scary Times

I’ve been hacked!

Published on February 7, 2022

Determining whether or not your computer or mobile device has been hacked can be difficult. Nonetheless, there are a few […]

Read I’ve been hacked!

Ways to Spot a Scam

Published on January 24, 2022

Have you seen email or text messages that offer you lots of money for little to no work on your […]

Read Ways to Spot a Scam

It’s Tax season – Don’t be a victim!

Published on January 18, 2022

Its tax season, and soon, the W-2’s and associated forms will start circulating, which means we must be aware of tax […]

Read It’s Tax season – Don’t be a victim!

Protecting University Data

Discover essential articles on cybersecurity practices specifically tailored for the University of Tennessee. Learn effective strategies to safeguard sensitive information, defend against threats, and maintain data integrity. Equip yourself with knowledge to protect your university’s digital ecosystem.

The Importance of Installing Approved Software

Published on February 19, 2024

As we navigate the ever-evolving landscape of cybersecurity, it’s crucial for each member of our university to play an active […]

Read The Importance of Installing Approved Software

Understanding Acceptable Use Policies (AUPs)

Published on February 12, 2024

As a user of our computer systems, you might have come across the term Acceptable Use Policy (AUP) in your workplace. But […]

Read Understanding Acceptable Use Policies (AUPs)
View All

Enhancing Cybersecurity: A Guide to Browser Extensions

Published on January 26, 2024

Browser extensions are a great way to enhance your browsing experience but can pose a significant security risk. Cybercriminals frequently […]

Read Enhancing Cybersecurity: A Guide to Browser Extensions

Cybersecurity and the Internet of Things

Published on December 13, 2023

Cybersecurity and the Internet of Things (IoT) The Internet of Things (IoT) is a term used to describe the network […]

Read Cybersecurity and the Internet of Things

Understanding Cybersecurity: A Glossary for Everyone

Published on December 1, 2023

In today’s digital age, understanding cybersecurity is not just for IT professionals but for everyone who uses the internet. Here […]

Read Understanding Cybersecurity: A Glossary for Everyone

Protecting Against Malware Concealed in PNG Images

Published on November 3, 2023

In our ongoing commitment to keeping our environment safe and secure, we bring to your attention a notable cybersecurity concern. […]

Read Protecting Against Malware Concealed in PNG Images

A Guide to Secure File Sharing in Microsoft 365 

Published on October 27, 2023

The modern workplace is more collaborative than ever, and digital file sharing has become an integral part of it. Microsoft […]

Read A Guide to Secure File Sharing in Microsoft 365 

Safeguarding Against QR Code Fishing

Published on October 20, 2023

In the ever-evolving landscape of cybersecurity threats, one emerging tactic is the use of QR codes in phishing emails. This […]

Read Safeguarding Against QR Code Fishing

Safeguarding Your Data in the Cloud: A Guide to Cloud Security

Published on September 20, 2023

In today’s digital age, cloud computing has become an integral part of how we store, access, and share data. Whether […]

Read Safeguarding Your Data in the Cloud: A Guide to Cloud Security

The Importance of Information Security

Published on August 28, 2023

Each week, we have a section in OIT Weekly about information security.  We give tips and tricks to help you […]

Read The Importance of Information Security

Are My Documents Secure in the Cloud? 

Published on June 20, 2022

With the increased use of cloud storage (Google Drive, Microsoft OneDrive, Dropbox, Evernote, etc.), individuals should take extra precautions to […]

Read Are My Documents Secure in the Cloud? 

Look, No Hands—Let OIT Continuously Monitor Your Systems

Published on June 13, 2022

One of the responsibilities of every user of UT’s IT resources is to continuously monitor their UT Owned workstations, laptops, and servers. What […]

Read Look, No Hands—Let OIT Continuously Monitor Your Systems

Plans and Programs and Controls, Oh My!

Published on June 6, 2022

Information security conversations often include words like “IT security plans,” “systems,” and “program plans.” What do these terms mean in […]

Read Plans and Programs and Controls, Oh My!

Secure File Transfer

Published on May 17, 2022

Vault (UT Secure Courier) is a secure file transfer application that allows users to easily share large files, including executables, […]

Read Secure File Transfer

File Sharing Options for Sensitive Information

Published on May 3, 2022

We regularly receive questions about sharing or storing sensitive information.  While we have several recommendations, first, let’s talk about why […]

Read File Sharing Options for Sensitive Information

Incident what?

Published on April 19, 2022

Information Security type individuals, as well as auditors, frequently talk about “Incident Response.” The term gets mentioned so much that […]

Read Incident what?

Compromised Workstations/Laptops

Published on April 4, 2022

Is your workstation or laptop running “slow”? Does it take FOREVER for an application to start? Do you come in […]

Read Compromised Workstations/Laptops

Data Loss Prevention (DLP)

Published on March 15, 2022

One of the biggest risks that we face is the loss of our data. Whether it is cyber-breach, a stolen mobile device, […]

Read Data Loss Prevention (DLP)