Cybersecurity and Safe Computing

Learn about our IT security policies, data integrity and compliance, report viruses, malware or email phishing.

Categories (2)

Duo

Everything you need to know about Duo including first time usage, restoring, and troubleshooting

Articles (16)

Pinned Article OneDrive and SharePoint: Storing Sensitive/Protected Data

UTHSC will only sanction the storage of FERPA-protected information, Protected Health Information (PHI), or other materials and information covered by the Health Insurance Portability and Accountability Act of 1996 (HIPAA) in the Microsoft 365 environment if the account(s) storing and accessing the information are enabled with two-factor authentication (DUO).

Pinned Article Security Requirements for Researchers

Aligning with the UTHSC mission and goals, researchers conduct various types of research. The data is often collected from human subjects and requires strict levels of protection

Acceptable Use of Generative AI

As technology continues to advance, it is essential for our community to stay aligned with emerging tools and technologies while simultaneously ensuring responsible and ethical practices. UTHSC’s Office of Cybersecurity and ITS have created a new guidance practice on the acceptable use of generative artificial intelligence (AI).

Compromised Computers or Devices

A Compromised Computer is defined as any computing resource whose confidentiality, integrity, or availability has been adversely impacted, either intentionally or unintentionally, by an untrusted source. A compromise can occur either through manual interaction by the untrusted source or through automation.

Data Sanitization Guidelines

Data sanitization is the process of irreversibly removing or destroying data stored on a memory device (hard drives, flash memory / SSDs, mobile devices, CDs, DVDs, etc.) or in hard copy form. It is important to use the proper technique to ensure that all data is purged.

Encrypting Outlook Emails

How do I encrypt an email? Encryption ensures that protected or sensitive information is not intercepted during email transmission, thus protecting you and the university from potentially costly and reputation-damaging data breaches.

Hacked - What to Look Out for and What to Do

Learn how to be prepared to respond if your think your device is hacked.

Information Security Requirements

ITS established a webpage explaining the information security requirements needed based on the data's classification level.

Privacy Flag to Suppress Your Information

If you would like to suppress your information for safety reasons, you can add a privacy flag to your account.

Reporting Suspicious Activity

Know what suspicious security threats to report and to whom.

Securing and Protecting Your Devices

These best practices about security and protecting devices will help protect the data on them.

Sensitive/Protected Storage Policy

ITS provides guidance and instructions on how to safely and securely store and share university data and documents. Learn more!

UT Vault: Send Large Files Securely to UT or Non-UT Users

The UT Vault (also known as UT Secure Courier) is a secure file transfer application that allows users to easily send large files, including executables, to those with NetIDs and those outside the UT system quickly, and securely.

VPN Security

Lean how a VPN works and the security behind it.

What To Report

Please report any suspicious computer/device issues to the ITS Service Desk at 901.448.2222.

Why Encrypt an Outlook Email

Learn why encrypting emails with confidential or classified information is so important!