Skip Content

The University of Texas at Arlington
menuMENU
  • Report an Incident
  • Home
  • Security Awareness
  • Policies and Standards
  • Risk Management
  • Contact Us
search
clear
news

Newsletter 2015

UTA_Dec15_HumanFirewall-1.jpg

December 2015

Be a Human Firewall

We may not think about it, but we all need to be human firewalls and understanding just what that entails in our professional and personal lives, might seem complicated or overwhelming. In this newsletter, we take a look at the top concerns of human firewalls both at work and at home.

UTA_Nov15_SocialEngineering-1.jpg

November 2015

The Social Engineering Issue

This newsletter adds some context to the most successful attack method ever devised - Social Engineering. Yes, Social Engineering attacks work because the bad guys attack YOU - the human - and not the technology. We’ll look at Social Engineering throughout history, going back more than three millennia.

UTA_Oct15_Malware-1.jpg

October 2015

The Malware Issue, Catching it, avoiding it, and what to do when you're infected

The hostile world of malware, viruses, Trojans and more! Did you know that the majority of successful cyber-attacks include malware? Some people believe that mobile devices are immune from malware, but with Facebook and an endless number of Apps, nothing could be farther from the truth. Take a look at this engaging issue and see if your 'malware smarts' are up to par!

UTA_Sep15_AtoZ-1.jpg

September 2015

The A to Z Guide of Security Awareness

Newsletter about all things security, from A to Z. What are the 'A-B-C's of security awareness that begin with a 'Z'? What about an 'X'? Or how about the awful Scrabble letter, 'J'? All it takes is a little bit of awareness and minding your 'P's and 'Q's to notch your security profile!

UTA_August2015_Nontechnical-1.jpg

August 2015

A deeper look at Nontechnical & Physical Security

Take a deeper look at nontechnical and physical security in our professional, personal, and mobile security lives. Topics also include, Social Media Sharing, Hotel Bills & Personally Identifiable Information (PII), Dumpster Diving & Garage Door Hacking, No Tech Hacking

UTA_July2015_Privacy-1.jpg

July 2015

The Privacy Issue

Privacy – defining what is PII, the many different lives of PII, the difference between Privacy versus Security, and how to protect yourself and your family from Identity Theft. BONUS – a full-page compliance chart of compliance standards related to privacy!

UTA_June2015_Cloud-1.jpg

June 2015

The Cloud is Not Yours

We hear the term used a lot but many still don’t truly understand what is meant by “the cloud.” A simple explanation: the cloud is someone else’s computer. It’s not yours. And that is exactly why there is so much debate about security in the cloud.

UTA-May2015_CyberCrime-1.jpg

May 2015

Cyber Crime Update

Review of 2015 network security threats, what are they and how to avoid them.

UTA-April2015_IDAuthenticate-1.jpg

April 2015

The Identification & Authentication Issue

Did you know that passwords are only one small part of identifying yourself to a computer, a network or any online service? Accessing hardware and software resources, also sometimes called the front door, usually consists of two components: Identification & Authentication, or I&A.

UTA-March2015_Social-1.jpg

March 2015

Let's Get Social!, Smart Social Networking

Properly using social networks and media can be quite complex and the security issues even more so. ? The security and privacy settings can change overnight and you never know when a hosting company (ISP, social media platform) might get hacked, violating your personal lives even further.

UTA_February2015-1.jpg

February 2015

The Many Lives of Security

Security in our personal, professional, and mobile lives as newer technology causes overlap in areas that were distinct at one time. This issue also addresses the internet of things, a question and answer section, the importance of policy, comments to contemplate, and more.

UTA_January2015-1.jpg

January 2015

End of Year Review

The biggest security issues of 2014 to include top 5 security threats, notable data breaches, critical infrastructure protection, and the use of USB drives and data loss.

Year

  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014

Information Security Office

Box 19800, Arlington, Texas 76019

Phone 817-272-5487 | Fax 817-272-2612

security@uta.edu

© 2022 The University of Texas at Arlington
Students | Faculty & Staff | Accessibility | Site Policies | Privacy and Legal Notice

Contact the webmaster