Skip to Main

Mission

Our mission is to protect the confidentiality, integrity and availability of the institution’s mission critical systems, applications, and data.

Vision

Our vision is to be THE leader in cybersecurity among all Academic Medical Centers.

Values

PIER: Partnership | Integrity | Excellence | Risk-driven

Always Use Multi-Factor Authentication

Multi-factor authentication (MFA) is a login process that requires you to verify your identity in more than one way. MFA helps ensure you’re the only person who can access your account, even if your password is stolen. Use multi-factor authentication wherever possible for banking, email, shopping, and social media accounts.

Common factors used for authentication:

  • Something you know (e.g., password, PIN)
  • Something you have (e.g., phone)

UTSW uses a multi-factor authentication app called DUO.

View DUO Common Questions and Helpful Videos

Explore Information Security Resources

solid square 3 dots top left, horizontal line, white circle to right contains person icon silhouette, bar with 6 dots across bottom of circle

Accounts & Passwords

Account security and password strength requirements and best practices

shield with white circle in center containing padlock icon

Encryption & Computer Basics

Guidelines for making data unreadable and/or secure to unauthorized users

ipsc icon

IPSC

UT Southwestern's Information Security and Privacy Steering Committee

icon generic head and shoulders with white checkmark in lower section

ISAC

ISAC governs the acquisition of information systems, related equipment, and software

rectangular outline of cellphone contains padlock icon in center space

Lost or Stolen Devices

Report lost or stolen devices to safeguard protected information

Policies & Standards

UT Southwestern guidelines for information security practices

globe icon with overlapping two-tone shield in lower right area

Security Awareness

Safeguard your password and avoid malware, ransomware, and phishing

shield icon with vertical slot down center, credit card icon emerging from space

Training

Information security training required for new and established employees

globe icon with padlock overlapping lower left

Vulnerability Management

Workstation and server best practices and common-sense tips to prevent security breaches

phone handset icon overlapping global graphic

Contact Us

Meet the team that serves your information security needs

Notice something suspicious on your computer?

Trust your instincts, and reach out for help right away via phone at 214-648-7600.

Report an Incident

Top Tasks

Reset Password Two-factor Authentication Policies ISAC Meetings & Deadlines ISAC Previously Reviewed Software

By the Numbers

UT Southwestern Data Highlights

icon

30 million+

Network security events that are detected annually

icon

15,900+

Malicious and unwanted programs blocked monthly

icon

10,000

Phishing and malicious emails blocked daily

Worldwide Data Highlights

icon

40 million+

Worldwide patient records exposed in 2021 due to cybercrime driven data breaches – View Details

icon

80%

Reported security incidents that are phishing attacks – View Details

icon

18,000+

New vulnerabilities discovered in worldwide systems in 2021 – View Details

Information Security Services


Questions about information security?

Office of Information Security
informationsecurity@utsouthwestern.edu

Contact Us