Skip to Main

Vulnerability Management

The computer equipment used by UTSW employees is vulnerable to security breaches. Workstation and server best practices and common-sense tips can help prevent security breaches.

lock icon

Login Required

If you are not on campus or VPN, you will be prompted for your username and password.

Icon of a two rows of servers with a shield and a check mark on it

Server Best Practices

Reduce risk by minimizing vulnerabilities on UTSW servers and helping application developers identify code-design security issues

Icon of a monitor with a check mark on on it

Workstation Best Practices

Simple steps can help ensure workstation security and help safeguard your data and computer