Search
Tour Request Form: Simulation Center - UT Southwestern, Dallas, TX
https://www.utsouthwestern.edu/departments/simulation-center/forms/tour.html
Use this for to request a tour of the Simulation Center at UT Southwestern.
Schedule a Simulation: Simulation Center - UT Southwestern, Dallas, Texas
https://www.utsouthwestern.edu/departments/simulation-center/forms/schedule.html
Faculty Resources Employee Resources Simulation Center Micro Navigation About Us Facility Highlights Services Activity Requests Simulation Innovation Lab Resources News & Events Request a Simulation Activity This form must be completed at least 90 days prior to implementation of a new simulation cour…
Intellectual Property Commercialization: Technology Development - UT Southwestern, Dallas, Texas
https://www.utsouthwestern.edu/about-us/administrative-offices/technology-development/intellectual-property/commercialization.html
Understand the commercialization process for intellectual property.
Deepfake: Information Security Awareness - UT Southwestern, Dallas, Texas
https://www.utsouthwestern.edu/employees/information-security/awareness/updates/deepfake.html
Deepfake refers to a video, photo or voice clone that is created using artificial intelligence (AI). AI can be used to replicate images, speech patterns and mannerisms to manipulate depictions of people and events. Threat actors can use this technology to spread misinformation, cause disruption, and erode trust.
Bluebugging: Information Security Awareness - UT Southwestern, Dallas, Texas
https://www.utsouthwestern.edu/employees/information-security/awareness/updates/bluebugging.html
Bluebugging occurs when a hacker exploits a vulnerability or weakness in a Bluetooth connection. They accomplish this through tools and software that can detect Bluetooth devices in proximity with vulnerable connections.
Doxing - UT Southwestern, Dallas, Texas
https://www.utsouthwestern.edu/employees/information-security/awareness/updates/doxing.html
“Doxing” (also spelled "doxxing") is a form of cyberbullying that uses identifiable information gathered from the internet with the intent to shame, scare, or blackmail the target.
Always Use Multi-Factor Authentication (MFA) - UT Southwestern, Dallas, Texas
https://www.utsouthwestern.edu/employees/information-security/awareness/updates/mfa.html
Multi-factor authentication (MFA) is a login process that requires you to verify your identity in more than one way.
Phishing Attack Consequences - UT Southwestern, Dallas, Texas
https://www.utsouthwestern.edu/employees/information-security/awareness/updates/consequences.html
Fraudulent links (URLs) and attachments found in emails can lead you to dangerous sites, putting your data, computer, and the UTSW network at risk.
Telecommuting Security Requirements - UT Southwestern, Dallas, Texas
https://www.utsouthwestern.edu/employees/information-security/awareness/updates/telecommuting.html
Following these requirements will significantly reduce risk to UT Southwestern and ensure policy compliance.
Watch out for scams asking for favors: Information Security Awareness - UT Southwestern, Dallas, Texas
https://www.utsouthwestern.edu/employees/information-security/awareness/updates/favors.html
Beware of anyone asking you to buy gift cards. A scammer, usually posing as a person of authority or familiarity, will send an email or text requesting a favor.