Skip to Main
Results 31-40 of 175 for ""

Tricky trivia: Information Security Awareness - UT Southwestern, Dallas, Texas

https://www.utsouthwestern.edu/employees/information-security/awareness/updates/tricky-trivia.html

Personality tests, polls, and surveys on social media can contribute to impersonation and identity theft.

Use caution to protect personal data, UTSW network: Information Security Awareness - UT Southwestern, Dallas, Texas

https://www.utsouthwestern.edu/employees/information-security/awareness/updates/use-caution.html

Fraudulent links (URLs) and attachments found in emails can lead you to dangerous sites, putting your data, computer, and the UTSW network at risk.

Retiree Group Insurance: Employees - HR Resources - UT Southwestern, Dallas, Texas

https://www.utsouthwestern.edu/employees/hr-resources/retirement/how-to-retire/retiree-group-insurance.html

Learn about benefits and eligibility requirements to participate in UT Southwestern's Retiree Group Insurance.

Don’t let cybercriminals hijack your personal information: Information Security Awareness - UT Southwestern, Dallas, Texas

https://www.utsouthwestern.edu/employees/information-security/awareness/updates/personal-information.html

Cookies are small files stored on your computer by websites you visit, allowing the sites to remember your device, browser preferences, online activity, and information.

Phishing – Back to Basics: Information Security Awareness - UT Southwestern, Dallas, Texas

https://www.utsouthwestern.edu/employees/information-security/awareness/updates/phishing-basics.html

Phishing attacks happen fast! According to Verizon 2024 Data Breach Investigations Report, “The median time to click on a malicious link after the email is opened is 21 seconds, and then it takes only another 28 seconds to enter the data. That leads to a frightening finding: The median time for

Lost or Stolen Media/Devices: Information Security - UT Southwestern, Dallas, Texas

https://www.utsouthwestern.edu/employees/information-security/lost-devices/

Report lost or stolen devices to safeguard protected health information, credit card numbers, intellectual property, and more.

Vulnerability Management: Information Security - UT Southwestern, Dallas, Texas

https://www.utsouthwestern.edu/employees/information-security/vulnerability/

The computer equipment used by UTSW employees is vulnerable to security breaches. Workstation and server best practices can help prevent security breaches.

Accounts: Information Security - UT Southwestern, Dallas, Texas

https://www.utsouthwestern.edu/employees/information-security/accounts-passwords/

User accounts with username/password parameters and two-factor authentication safeguard UT Southwestern systems.

ISAC: Information Security - UT Southwestern, Dallas, Texas

https://www.utsouthwestern.edu/employees/information-security/isac/

Information Systems Acquisition Committee (ISAC) governs the acquisition of information systems, related equipment, and software for UT Southwestern.

Updates: Information Security - UT Southwestern, Dallas, Texas

https://www.utsouthwestern.edu/employees/information-security/awareness/updates/

Read the latest news and updates about maintaining internet security via your electronic devices at UTSW.