Search14 Results
- Knowledge Base
- Cybersecurity and Safe Computing
A Compromised Computer is defined as any computing resource whose confidentiality, integrity, or availability has been adversely impacted, either intentionally or unintentionally, by an untrusted source. A compromise can occur either through manual interaction by the untrusted source or through automation.
- Knowledge Base
- Cybersecurity and Safe Computing
- Security Preparedness and Response (SPAR)
Insider Threat is a human security risk that originates within an organization. According to the 2019 Verizon Data Breach Investigation Report, a third of all data breaches within organizations involve internal staff.
- Knowledge Base
- Cybersecurity and Safe Computing
These best practices about security and protecting devices will help protect the data on them.
- Knowledge Base
- Cybersecurity and Safe Computing
Lean how a VPN works and the security behind it.
- Knowledge Base
- Cybersecurity and Safe Computing
ITS established a webpage explaining the information security requirements needed based on the data's classification level.
- Knowledge Base
- Cybersecurity and Safe Computing
Please report any suspicious computer/device issues to the ITS Service Desk at 901.448.2222.
- Knowledge Base
- Cybersecurity and Safe Computing
- Security Preparedness and Response (SPAR)
If you answer the phone and hear a recorded message instead of a live person, it's a robocall.
- Knowledge Base
- Cybersecurity and Safe Computing
- Security Preparedness and Response (SPAR)
The Shelby County Sheriff's Office delivered a warning on telephone scams and what to look for to avoid being a victim.
- Knowledge Base
- Cybersecurity and Safe Computing
- Security Preparedness and Response (SPAR)
Separating your business and personal email accounts is a best practice. Your organization shouldn't have access to your personal privacy. UTHSC's emails are subject to eDiscovery searches and disclosures.
- Knowledge Base
- Cybersecurity and Safe Computing
- Security Preparedness and Response (SPAR)
Ransomware is a form of malware that encrypts a victim's files. The attacker then demands a ransom from the victim to restore access to the data upon payment.
- Knowledge Base
- Cybersecurity and Safe Computing
- Security Preparedness and Response (SPAR)
Phishing attacks use email or malicious websites (clicking on a link) to collect personal and financial information or infect your machine with malware and viruses.
- Knowledge Base
- Cybersecurity and Safe Computing
- Security Preparedness and Response (SPAR)
Passwords are the gateway to all your accounts and information. Creating strong, unique passwords goes a long way to protecting that data.
- Knowledge Base
- Cybersecurity and Safe Computing
- Security Preparedness and Response (SPAR)
Keeping devices current for operating systems and software is a best practice to reduce the vulnerabilities to those devices.
- Knowledge Base
- Cybersecurity and Safe Computing
- Security Preparedness and Response (SPAR)
There are many holiday scams related to shopping and online purchasing. Learn some tips on what you can do to spot the scams.