Cybersecurity and Safe Computing

Learn about our IT security policies, data integrity and compliance, report viruses, malware or email phishing.

Categories (2)


Everything you need to know about Duo including first time usage, restoring, and troubleshooting

Articles (15)

Pinned Article OneDrive and SharePoint: Storing Sensitive/Protected Data

UTHSC will only sanction the storage of FERPA-protected information, Protected Health Information (PHI), or other materials and information covered by the Health Insurance Portability and Accountability Act of 1996 (HIPAA) in the Microsoft 365 environment if the account(s) storing and accessing the information are enabled with two-factor authentication (DUO).

Pinned Article Security Requirements for Researchers

Aligning with the UTHSC mission and goals, researchers conduct various types of research. The data is often collected from human subjects and requires strict levels of protection

Compromised Computers or Devices

A Compromised Computer is defined as any computing resource whose confidentiality, integrity, or availability has been adversely impacted, either intentionally or unintentionally, by an untrusted source. A compromise can occur either through manual interaction by the untrusted source or through automation.

Data Sanitization Guidelines

Data sanitization is the process of irreversibly removing or destroying data stored on a memory device (hard drives, flash memory / SSDs, mobile devices, CDs, DVDs, etc.) or in hard copy form. It is important to use the proper technique to ensure that all data is purged.

Hacked - What to Look Out for and What to Do

Learn how to be prepared to respond if your think your device is hacked.

Information Security Requirements

ITS established a webpage explaining the information security requirements needed based on the data's classification level.

Outlook: Encrypting Emails

How do I encrypt an email? Encryption ensures that protected or sensitive information is not intercepted during email transmission, thus protecting you and the university from potentially costly and reputation-damaging data breaches.

Outlook: Why Encrypt an Email

Learn why encrypting emails with confidential or classified information is so important!

Privacy Flag to Suppress Your Information

If you would like to suppress your information for safety reasons, you can add a privacy flag to your account.

Reporting Suspicious Activity

Know what suspicious security threats to report and to whom.

Securing and Protecting Your Devices

These best practices about security and protecting devices will help protect the data on them.

Sending Large Files Securely Using UT Vault

The UT Vault (also known as UT Secure Courier) is a secure file transfer application that allows users to easily send large files, including executables, quickly, and securely.

Sensitive/Protected Storage Policy

ITS provides guidance and instructions on how to safely and securely store and share university data and documents. Learn more!

VPN Security

Lean how a VPN works and the security behind it.

What To Report

Please report any suspicious computer/device issues to the ITS Service Desk at 901.448.2222.