Skip to Main
Results 21-30 of 171 for ""

Vulnerability Management: Information Security - UT Southwestern, Dallas, Texas

https://www.utsouthwestern.edu/employees/information-security/vulnerability/

The computer equipment used by UTSW employees is vulnerable to security breaches. Workstation and server best practices can help prevent security breaches.

Texas Risk and Authorization Management Program (TX-RAMP) - UT Southwestern, Dallas, TX

https://www.utsouthwestern.edu/employees/information-security/tx-ramp/

Texas Risk and Authorization Management Program (TX-RAMP) provides a review of security measures taken by cloud products and services that transmit data to Texas state agencies.

Avoid geographical cyber targeting: Information Security Awareness - UT Southwestern, Dallas, Texas

https://www.utsouthwestern.edu/employees/information-security/awareness/updates/avoid-geographical-cyber-targeting.html

Geo-targeted phishing occurs when cybercriminals execute customized attacks based on your geographic location.

Security tips for mobile apps: Information Security Awareness - UT Southwestern, Dallas, Texas

https://www.utsouthwestern.edu/employees/information-security/awareness/updates/security-tips-for-mobile-apps.html

Some mobile apps are designed to resemble legitimate apps but instead carry out malicious activities like stealing data. Use these simple tips before you download from your device’s app store.

Did you get hooked?: Information Security Awareness - UT Southwestern, Dallas, Texas

https://www.utsouthwestern.edu/employees/information-security/awareness/updates/did-you-get-hooked.html

A realistic looking phishing email was sent to employees and staff for the purpose of strengthening UTSW security awareness and response.

Security Awareness: Information Security - UT Southwestern, Dallas, Texas

https://www.utsouthwestern.edu/employees/information-security/awareness/

Employees can find important resources from Information Security to help keep computers safe from online attacks, phishing, data theft, and malicious software.

Password Spraying: Information Security Awareness - UT Southwestern, Dallas, Texas

https://www.utsouthwestern.edu/employees/information-security/awareness/updates/password-spraying.html

Password spraying involves an attacker placing a list of potential usernames in a program and trying a common or default password against the list of usernames.

Online Donations: Information Security Awareness - UT Southwestern, Dallas, Texas

https://www.utsouthwestern.edu/employees/information-security/awareness/updates/online-donations.html

It is easier than ever to support the charity of your choice with online donations. It is also easier than ever for scammers to masquerade as a charity and take advantage of those who want to help in a disaster. Spotting fake charity campaigns can be difficult.

Social Engineering: Information Security Awareness - UT Southwestern, Dallas, Texas

https://www.utsouthwestern.edu/employees/information-security/awareness/updates/social-engineering.html

Social engineering is a low-tech approach used by scammers to gain access to an organization’s information and resources.

Image-Based Phishing: Information Security Awareness - UT Southwestern, Dallas, Texas

https://www.utsouthwestern.edu/employees/information-security/awareness/updates/image-based-phishing.html

Images may be used by cyber attackers to perform a phishing attack just like a malicious link or an infected attachment. Clicking an image or graphic included in an email may execute malware, initiate a malicious download, or send you to a website intended to steal your credentials or financial