Search15 Results
- Knowledge Base
- Cybersecurity and Safe Computing
- Security Preparedness and Response (SPAR)
If you answer the phone and hear a recorded message instead of a live person, it's a robocall.
- Knowledge Base
- Cybersecurity and Safe Computing
- Security Preparedness and Response (SPAR)
The Shelby County Sheriff's Office delivered a warning on telephone scams and what to look for to avoid being a victim.
- Knowledge Base
- Cybersecurity and Safe Computing
- Security Preparedness and Response (SPAR)
Separating your business and personal email accounts is a best practice. Your organization shouldn't have access to your personal privacy. UTHSC's emails are subject to eDiscovery searches and disclosures.
- Knowledge Base
- Cybersecurity and Safe Computing
- Security Preparedness and Response (SPAR)
Ransomware is a form of malware that encrypts a victim's files. The attacker then demands a ransom from the victim to restore access to the data upon payment.
- Knowledge Base
- Cybersecurity and Safe Computing
- Security Preparedness and Response (SPAR)
Phishing attacks use email or malicious websites (clicking on a link) to collect personal and financial information or infect your machine with malware and viruses.
- Knowledge Base
- Cybersecurity and Safe Computing
- Security Preparedness and Response (SPAR)
Passwords are the gateway to all your accounts and information. Creating strong, unique passwords goes a long way to protecting that data.
- Knowledge Base
- Cybersecurity and Safe Computing
- Security Preparedness and Response (SPAR)
There are many holiday scams related to shopping and online purchasing. Learn some tips on what you can do to spot the scams.
- Knowledge Base
- Cybersecurity and Safe Computing
- Security Preparedness and Response (SPAR)
Keeping devices current for operating systems and software is a best practice to reduce the vulnerabilities to those devices.
- Knowledge Base
- Cybersecurity and Safe Computing
- Security Preparedness and Response (SPAR)
Insider Threat is a human security risk that originates within an organization. According to the 2019 Verizon Data Breach Investigation Report, a third of all data breaches within organizations involve internal staff.
- Knowledge Base
- Cybersecurity and Safe Computing
Please report any suspicious computer/device issues to the ITS Service Desk at 901.448.2222.
- Knowledge Base
- Cybersecurity and Safe Computing
Lean how a VPN works and the security behind it.
- Knowledge Base
- Cybersecurity and Safe Computing
These best practices about security and protecting devices will help protect the data on them.
- Knowledge Base
- Cybersecurity and Safe Computing
ITS established a webpage explaining the information security requirements needed based on the data's classification level.
- Knowledge Base
- Cybersecurity and Safe Computing
A Compromised Computer is defined as any computing resource whose confidentiality, integrity, or availability has been adversely impacted, either intentionally or unintentionally, by an untrusted source. A compromise can occur either through manual interaction by the untrusted source or through automation.
- Knowledge Base
- Cybersecurity and Safe Computing
As technology continues to advance, it is essential for our community to stay aligned with emerging tools and technologies while simultaneously ensuring responsible and ethical practices. UTHSC’s Office of Cybersecurity and ITS have created a new guidance practice on the acceptable use of generative artificial intelligence (AI).