Skip to Main

Search

Results 9,331 to 9,340 of 10,000 for ""

Tour Request Form: Simulation Center - UT Southwestern, Dallas, TX

https://www.utsouthwestern.edu/departments/simulation-center/forms/tour.html

Use this for to request a tour of the Simulation Center at UT Southwestern.

Schedule a Simulation: Simulation Center - UT Southwestern, Dallas, Texas

https://www.utsouthwestern.edu/departments/simulation-center/forms/schedule.html

Faculty Resources Employee Resources Simulation Center Micro Navigation About Us Facility Highlights Services Activity Requests Simulation Innovation Lab Resources News & Events Request a Simulation Activity This form must be completed at least 90 days prior to implementation of a new simulation cour…

Intellectual Property Commercialization: Technology Development - UT Southwestern, Dallas, Texas

https://www.utsouthwestern.edu/about-us/administrative-offices/technology-development/intellectual-property/commercialization.html

Understand the commercialization process for intellectual property.

Deepfake: Information Security Awareness - UT Southwestern, Dallas, Texas

https://www.utsouthwestern.edu/employees/information-security/awareness/updates/deepfake.html

Deepfake refers to a video, photo or voice clone that is created using artificial intelligence (AI). AI can be used to replicate images, speech patterns and mannerisms to manipulate depictions of people and events. Threat actors can use this technology to spread misinformation, cause disruption, and erode trust.

Bluebugging: Information Security Awareness - UT Southwestern, Dallas, Texas

https://www.utsouthwestern.edu/employees/information-security/awareness/updates/bluebugging.html

Bluebugging occurs when a hacker exploits a vulnerability or weakness in a Bluetooth connection. They accomplish this through tools and software that can detect Bluetooth devices in proximity with vulnerable connections.

Doxing - UT Southwestern, Dallas, Texas

https://www.utsouthwestern.edu/employees/information-security/awareness/updates/doxing.html

“Doxing” (also spelled "doxxing") is a form of cyberbullying that uses identifiable information gathered from the internet with the intent to shame, scare, or blackmail the target.

Always Use Multi-Factor Authentication (MFA) - UT Southwestern, Dallas, Texas

https://www.utsouthwestern.edu/employees/information-security/awareness/updates/mfa.html

Multi-factor authentication (MFA) is a login process that requires you to verify your identity in more than one way.

Phishing Attack Consequences - UT Southwestern, Dallas, Texas

https://www.utsouthwestern.edu/employees/information-security/awareness/updates/consequences.html

Fraudulent links (URLs) and attachments found in emails can lead you to dangerous sites, putting your data, computer, and the UTSW network at risk.

Telecommuting Security Requirements - UT Southwestern, Dallas, Texas

https://www.utsouthwestern.edu/employees/information-security/awareness/updates/telecommuting.html

Following these requirements will significantly reduce risk to UT Southwestern and ensure policy compliance.

Watch out for scams asking for favors: Information Security Awareness - UT Southwestern, Dallas, Texas

https://www.utsouthwestern.edu/employees/information-security/awareness/updates/favors.html

Beware of anyone asking you to buy gift cards. A scammer, usually posing as a person of authority or familiarity, will send an email or text requesting a favor.