Search
UTSW BRG Mentorship Programs
https://www.utsouthwestern.edu/employees/campus-updates/articles/year-2024/brg-mentorship.html
UT Southwestern’s Business Resource Groups (BRGs) and mentorship program leave lasting impact Published on: May 14, 2024 Share Share on Facebook Share on Twitter Share on LinkedIn Email this page Print this page UT Southwestern’s Business Resource Groups (BRGs) were created to offer a positive, inclusive environment facilitating personal growth and institutional advancement. Open to all UTSW community members, the BRGs cultivate a sense of community, belonging, and support, providing a space
Zombie Apps & Accounts: Information Security Awareness - UT Southwestern, Dallas, Texas
https://www.utsouthwestern.edu/employees/information-security/awareness/updates/zombie-app-accounts.html
Zombie apps and accounts are forgotten online services that endanger your privacy, clutter your phone, and drain your battery. Your information is likely in apps, websites, and services you’ve long forgotten about. Having your email address, password, and name littered across the internet makes you
Social Engineering: Information Security Awareness - UT Southwestern, Dallas, Texas
https://www.utsouthwestern.edu/employees/information-security/awareness/updates/social-engineering.html
Social engineering is a low-tech approach used by scammers to gain access to an organization’s information and resources.
Good practices for scanning QR codes: Information Security Awareness - UT Southwestern, Dallas, Texas
https://www.utsouthwestern.edu/employees/information-security/awareness/updates/scanning-qr-codes.html
QR codes are the square, scannable codes that you see for touchless menus at restaurants, real estate listings, TV ads, social media posts, and more.Cybercriminals can also create QR codes that direct people to malicious website, so follow tips to scan QR codes safely.
It’s time for an IT spring cleaning: Information Security Awareness - UT Southwestern, Dallas, Texas
https://www.utsouthwestern.edu/employees/information-security/awareness/updates/it-spring-cleaning.html
Ensure the safety of your data and devices by using the following IT spring cleaning tips for your UTSW and personal accounts.
Online Donations: Information Security Awareness - UT Southwestern, Dallas, Texas
https://www.utsouthwestern.edu/employees/information-security/awareness/updates/online-donations.html
It is easier than ever to support the charity of your choice with online donations. It is also easier than ever for scammers to masquerade as a charity and take advantage of those who want to help in a disaster. Spotting fake charity campaigns can be difficult.
Image-Based Phishing: Information Security Awareness - UT Southwestern, Dallas, Texas
https://www.utsouthwestern.edu/employees/information-security/awareness/updates/image-based-phishing.html
Images may be used by cyber attackers to perform a phishing attack just like a malicious link or an infected attachment. Clicking an image or graphic included in an email may execute malware, initiate a malicious download, or send you to a website intended to steal your credentials or financial
Free Digital Offerings: Information Security Awareness - UT Southwestern, Dallas, Texas
https://www.utsouthwestern.edu/employees/information-security/awareness/updates/free-digital-offerings.html
Are you tempted to install “free” software from the internet? Have you considered the hidden cost you pay for free apps, social media, toolbars, search engines and other digital offerings that look too good to pass up?
When is the last time you Googled yourself?: Information Security Awareness - UT Southwestern, Dallas, Texas
https://www.utsouthwestern.edu/employees/information-security/awareness/updates/googled-yourself.html
Search the internet to see what information about you is publicly available. These same resources are available to cybercriminals who can use what they find to target you.
Dumpster Diving: Information Security Awareness - UT Southwestern, Dallas, Texas
https://www.utsouthwestern.edu/employees/information-security/awareness/updates/dumpster-diving-trash.html
Dumpster diving is searching someone’s trash for information that can be used to launch a social engineering and/or computer system attack.