Skip to Main


Our mission is to protect the confidentiality, integrity and availability of the institution’s mission critical systems, applications, and data.


Our vision is to be THE leader in cybersecurity among all Academic Medical Centers.


PIER: Partnership | Integrity | Excellence | Risk-driven

Phishing – Back to Basics

Phishing attacks happen fast!  According to Verizon 2024 Data Breach Investigations Report, “The median time to click on a malicious link after the email is opened is 21 seconds, and then it takes only another 28 seconds to enter the data. That leads to a frightening finding: The median time for users to fall for phishing emails is less than 60 seconds.”

Learn more about phishing

Explore Information Security Resources

solid square 3 dots top left, horizontal line, white circle to right contains person icon silhouette, bar with 6 dots across bottom of circle

Accounts & Passwords

Account security and password strength requirements and best practices

shield with white circle in center containing padlock icon

Encryption & Computer Basics

Guidelines for making data unreadable and/or secure to unauthorized users

ipsc icon


UT Southwestern's Information Security and Privacy Steering Committee

icon generic head and shoulders with white checkmark in lower section


ISAC governs the acquisition of information systems, related equipment, and software

rectangular outline of cellphone contains padlock icon in center space

Lost or Stolen Devices

Report lost or stolen devices to safeguard protected information

Policies & Standards

UT Southwestern guidelines for information security practices

globe icon with overlapping two-tone shield in lower right area

Security Awareness

Safeguard your password and avoid malware, ransomware, and phishing

shield icon with vertical slot down center, credit card icon emerging from space


Information security training required for new and established employees

globe icon with padlock overlapping lower left

Vulnerability Management

Workstation and server best practices and common-sense tips to prevent security breaches

phone handset icon overlapping global graphic

Contact Us

Meet the team that serves your information security needs

Notice something suspicious on your computer?

Trust your instincts, and reach out for help right away via phone at 214-648-7600.

Report an Incident

Top Tasks

Reset Password Two-factor Authentication Policies ISAC Meetings & Deadlines ISAC Previously Reviewed Software

By the Numbers

UT Southwestern Data Highlights

30 million+

Network security events that are detected annually


Malicious and unwanted programs blocked monthly


Phishing and malicious emails blocked daily

Worldwide Data Highlights

40 million+

Worldwide patient records exposed in 2021 due to cybercrime driven data breaches – View Details


Reported security incidents that are phishing attacks – View Details


New vulnerabilities discovered in worldwide systems in 2021 – View Details

Information Security Services

Questions about information security?

Office of Information Security

Contact Us