Skip to Main


Our mission is to protect the confidentiality, integrity and availability of the institution’s mission critical systems, applications, and data.


Our vision is to be THE leader in cybersecurity among all Academic Medical Centers.


PIER: Partnership | Integrity | Excellence | Risk-driven

Always Use Multi-Factor Authentication

Multi-factor authentication (MFA) is a login process that requires you to verify your identity in more than one way. MFA helps ensure you’re the only person who can access your account, even if your password is stolen. Use multi-factor authentication wherever possible for banking, email, shopping, and social media accounts.

Common factors used for authentication:

  • Something you know (e.g., password, PIN)
  • Something you have (e.g., phone)

UTSW uses a multi-factor authentication app called DUO.

View DUO Common Questions and Helpful Videos

Explore Information Security Resources

solid square 3 dots top left, horizontal line, white circle to right contains person icon silhouette, bar with 6 dots across bottom of circle

Accounts & Passwords

Account security and password strength requirements and best practices

shield with white circle in center containing padlock icon

Encryption & Computer Basics

Guidelines for making data unreadable and/or secure to unauthorized users

ipsc icon


UT Southwestern's Information Security and Privacy Steering Committee

icon generic head and shoulders with white checkmark in lower section


ISAC governs the acquisition of information systems, related equipment, and software

rectangular outline of cellphone contains padlock icon in center space

Lost or Stolen Devices

Report lost or stolen devices to safeguard protected information

Policies & Standards

UT Southwestern guidelines for information security practices

globe icon with overlapping two-tone shield in lower right area

Security Awareness

Safeguard your password and avoid malware, ransomware, and phishing

shield icon with vertical slot down center, credit card icon emerging from space


Information security training required for new and established employees

globe icon with padlock overlapping lower left

Vulnerability Management

Workstation and server best practices and common-sense tips to prevent security breaches

phone handset icon overlapping global graphic

Contact Us

Meet the team that serves your information security needs

Notice something suspicious on your computer?

Trust your instincts, and reach out for help right away via phone at 214-648-7600.

Report an Incident

Top Tasks

Reset Password Two-factor Authentication Policies ISAC Meetings & Deadlines ISAC Previously Reviewed Software

By the Numbers

UT Southwestern Data Highlights


30 million+

Network security events that are detected annually



Malicious and unwanted programs blocked monthly



Phishing and malicious emails blocked daily

Worldwide Data Highlights


40 million+

Worldwide patient records exposed in 2021 due to cybercrime driven data breaches – View Details



Reported security incidents that are phishing attacks – View Details



New vulnerabilities discovered in worldwide systems in 2021 – View Details

Information Security Services

Questions about information security?

Office of Information Security

Contact Us