Skip Content

The University of Texas at Arlington
menuMENU
  • Report an Incident
  • Home
  • Security Awareness
  • Policies and Standards
  • Risk Management
  • Contact Us
search
clear

Current Newsletters

  • May 2021 Newsletter

    May 2021 Newsletter - Incident Response

  • March 2021 Newsletter

    March 2021 Newsletter - Incident Response

  • January 2021 Newsletter

    January 2021 Newsletter - Incident Response

The Top Ten Security Practices

May 2017

The Top Ten Security Practices

Knowledge is power. And, in this case, that power enables us to protect ourselves, our organizations, our families, and our friends. Check out our collection of top ten lists and see how they can be applied to your everyday life at work, at home, and on the go. Remember that each and every one of us has it in ourselves to be a strong human firewall and combat cybercrime.

  1. 2016 set an all-time high in data breaches with how many records exposed globally? (4 billion)
  2. A cyber thief spoofing the email of a high-level executive and requesting sensitive information is an example of what? (CEO Fraud or Business Email Compromise)
  3. If your Android phone is stolen, you can use this to remote erase your data. (Android Device Manager)
  4. If your iPhone is stolen, you can use this to remote erase your data. (Find My iPhone)
  5. By always doing this, everyone within our organization becomes a security asset and strengthens our resistance to cybercrime. (Following policy.)

Read the full newsletter on SharePoint ยป

Information Security Office

Box 19800, Arlington, Texas 76019

Phone 817-272-5487 | Fax 817-272-2612

security@uta.edu

© 2022 The University of Texas at Arlington
Students | Faculty & Staff | Accessibility | Site Policies | Privacy and Legal Notice

Contact the webmaster