Search14 Results

ITS established a webpage explaining the information security requirements needed based on the data's classification level.
Lean how a VPN works and the security behind it.
Please report any suspicious computer/device issues to the ITS Service Desk at 901.448.2222.
These best practices about security and protecting devices will help protect the data on them.
If you answer the phone and hear a recorded message instead of a live person, it's a robocall.
The Shelby County Sheriff's Office delivered a warning on telephone scams and what to look for to avoid being a victim.
Separating your business and personal email accounts is a best practice. Your organization shouldn't have access to your personal privacy. UTHSC's emails are subject to eDiscovery searches and disclosures.
Ransomware is a form of malware that encrypts a victim's files. The attacker then demands a ransom from the victim to restore access to the data upon payment.
Phishing attacks use email or malicious websites (clicking on a link) to collect personal and financial information or infect your machine with malware and viruses.
Passwords are the gateway to all your accounts and information. Creating strong, unique passwords goes a long way to protecting that data.
Keeping devices current for operating systems and software is a best practice to reduce the vulnerabilities to those devices.
Insider Threat is a human security risk that originates within an organization. According to the 2019 Verizon Data Breach Investigation Report, a third of all data breaches within organizations involve internal staff.
A Compromised Computer is defined as any computing resource whose confidentiality, integrity, or availability has been adversely impacted, either intentionally or unintentionally, by an untrusted source. A compromise can occur either through manual interaction by the untrusted source or through automation.
There are many holiday scams related to shopping and online purchasing. Learn some tips on what you can do to spot the scams.