Skip to Main

Mission

Our mission is to protect the confidentiality, integrity and availability of the institution’s mission critical systems, applications, and data.

Vision

Our vision is to be THE leader in cybersecurity among all Academic Medical Centers.

Values

PIER: Partnership | Integrity | Excellence | Risk-driven

Business Email Compromise (BEC) Attacks

A business email compromise (BEC) attack is a type of phishing attack in which a cybercriminal impersonates a trusted contact and uses social engineering techniques to trick an email recipient into transferring funds into a fraudulent account. BEC techniques are used to make requests for gift card purchases, wire transfers, real estate transactions as well as to reroute employees’ direct deposits.

BEC Prevention:

  • Be on guard with all unsolicited emails and phone calls.
  • Verify originating email addresses and phone numbers when sensitive requests are made.
  • Confirm payment and purchase requests in person if possible or by calling the person to make sure it is legitimate.

If you believe you have been a victim of a BEC attack, alert your supervisor immediately.

Explore Information Security Resources

solid square 3 dots top left, horizontal line, white circle to right contains person icon silhouette, bar with 6 dots across bottom of circle

Accounts & Passwords

Account security and password strength requirements and best practices

shield with white circle in center containing padlock icon

Encryption & Computer Basics

Guidelines for making data unreadable and/or secure to unauthorized users

ipsc icon

IPSC

UT Southwestern's Information Security and Privacy Steering Committee

icon generic head and shoulders with white checkmark in lower section

ISAC

ISAC governs the acquisition of information systems, related equipment, and software

rectangular outline of cellphone contains padlock icon in center space

Lost or Stolen Devices

Report lost or stolen devices to safeguard protected information

Policies & Standards

UT Southwestern guidelines for information security practices

globe icon with overlapping two-tone shield in lower right area

Security Awareness

Safeguard your password and avoid malware, ransomware, and phishing

shield icon with vertical slot down center, credit card icon emerging from space

Training

Information security training required for new and established employees

globe icon with padlock overlapping lower left

Vulnerability Management

Workstation and server best practices and common-sense tips to prevent security breaches

phone handset icon overlapping global graphic

Contact Us

Meet the team that serves your information security needs

Notice something suspicious on your computer?

Trust your instincts, and reach out for help right away via phone at 214-648-7600.

Report an Incident

Top Tasks

Reset Password Two-factor Authentication Policies ISAC Meetings & Deadlines ISAC Previously Reviewed Software

By the Numbers

UT Southwestern Data Highlights


30 million+

Network security events that are detected annually


15,900+

Malicious and unwanted programs blocked monthly


10,000

Phishing and malicious emails blocked daily

Worldwide Data Highlights


40 million+

Worldwide patient records exposed in 2021 due to cybercrime driven data breaches – View Details


80%

Reported security incidents that are phishing attacks – View Details


18,000+

New vulnerabilities discovered in worldwide systems in 2021 – View Details

Information Security Services


Questions about information security?

Office of Information Security
informationsecurity@utsouthwestern.edu

Contact Us