Skip Content

The University of Texas at Arlington
menuMENU
  • Report an Incident
  • Home
  • Security Awareness
  • Policies and Standards
  • Risk Management
  • Contact Us
search
clear
news

Newsletter 2017

UTA_DEC2017_PrivacyVsSecurity-1.jpg

December 2017

Privacy vs Security

Do you know the difference between privacy and security? Understanding how these two concepts work together, and how they differ, is key to improving our overall defense.

UTA_NOV2017_SocialEngineering_Phishing-1.jpg

November 2017

Social Engineering and Phishing

Cybersecurity is a human process that social engineers attempt to exploit in many different ways. From phishing to tailgating to dumpster diving, we need to be aware of the threats we face in all three domains (cyber, physical, people).

UTA_OCT2017_BeingSmartAboutSmartDevices-1.jpg

October 2017

Being Smart About Smart Devices

Imagine a world where your refrigerator orders groceries on your behalf, which are then delivered by computer-controlled drones or driverless vehicles.

UTA_SEPT2017_TheFrontDoor-1.jpg

September 2017

The Front Door

It’s often said that passwords are the first line of defense when it comes to information security. But is that still the case? And what does the future hold for identification and authentication? Are biometrics any better?

UTA_AUG2017_Malware-1.jpg

August 2017

Malware

How much is your computer worth? What about your smartphone? Your identity? Everything has a price and cybercriminals are looking to profit.

UTA_July2017_SeeSomethingSaySomething-1.jpg

July 2017

See Something? Say Something!

Security incidents are going to happen, sometimes because of mistakes and sometimes because of things beyond our control.

UTA_June2017_SafelySailingTheCyberSeas-1.jpg

June 2017

Safely Sailing the Cyber Seas

Most of us never think about how much work goes into the way we communicate. When we do consider the greatness of the networks that connect us, we should treat them with respectful caution; respect for the power that flows through the cables, caution for interacting with the people who want to do us wrong.

UTA_May2017_TopTen-1.jpg

May 2017

The Top Ten Security Practices

Knowledge is power. And, in this case, that power enables us to protect ourselves, our organizations, our families, and our friends. Check out our collection of top ten lists and see how they can be applied to your everyday life at work, at home, and on the go. Remember that each and every one of us has it in ourselves to be a strong human firewall and combat cybercrime.

UTA_April2017_AwarenessSecurityandTheRuleOfThree-1.jpg

April 2017

April 2017 Newsletter

We are surrounded by the number three. When arming cyber-aware citizens on the third rock from the sun, we rely on three security triads: The CIA Triad, Domains Triad, and Many Lives Triad lay the foundation of what it means to be secure in every aspect of the ongoing battle against cybercrime.

UTA_Mar2017_BecomeAHumanFirewall-1.jpg

March 2017

Become a Human Firewall

Whether you know it or not, YOU are a human firewall. That is not up for debate. It’s just a matter of how good you are at being one. As a human firewall you have a lot of responsibilities. The good news is that those responsibilities don’t require strong technical or computer skills.

UTA_Feb2017_TheYearCybercrimeWon-1.jpg

February 2017

Cybercrime Update

Cyber threats are not going away. Most experts think the Security of Things will get worse before it gets better. Tech companies will continue to release products rife with security flaws, errors or misconfigurations. Cybercriminals will continue to discover new ways to find and steal data and to compromise organizations.

UTA_Jan2017_CommonSenseSecurity-1.jpg

January 2017

Common Sense Security

No piece of information security technology, like biometrics (fingerprint scanners, facial recognition, etc.), is totally secure. There is always a way to enter, bypass, fool or otherwise render security ineffective. At the same time, we can’t just sit around and wait for it to improve, just like we can’t sit around waiting for tech companies to enhance security features, or for governments to regulate tech companies.

Year

  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014

Information Security Office

Box 19800, Arlington, Texas 76019

Phone 817-272-5487 | Fax 817-272-2612

security@uta.edu

© 2022 The University of Texas at Arlington
Students | Faculty & Staff | Accessibility | Site Policies | Privacy and Legal Notice

Contact the webmaster