Skip Content

The University of Texas at Arlington
menuMENU
  • Report an Incident
  • Home
  • Security Awareness
  • Policies and Standards
  • Risk Management
  • Contact Us
search
clear
news

Newsletter 2018

UTA_NL-2018-December_GettingPhished-1.jpg

December 2018

Getting Phished

From advance-fee scams to spoofed email addresses, phishing has long been the go-to attack in the social engineer’s playbook. In this month’s issue, we cover why phishing works via a real-life example, and highlight the obvious signs of an attack with a phishing identification checklist.

UTA_2018-November-EN-NM_ReportingIncidents-1.jpg

November 2018

Incident Response

How much damage can a security incident cause in one minute? How much damage can that same security incident cause if left unreported for one hour? Is that 60 times the potential damage? Or what about one day or even a week or longer?

UTAOct-2018Newsletter-Identification_Authentication-1.jpg

October 2018

Identification and Authentication

Passwords have been around for centuries… ever since humans felt the need to password-protect something (the right to enter or pass, for example). Fast-forward to today and the need for strong identification and authentication is more important than ever.

UTASept-2018-Newsletter_TheHumanSideOfSecurity-1.jpg

September 2018

The Human Side of Security

There is no shortage of technical solutions for defending organizations against cyber threats. A quick internet search yields many options for threat detection, threat prevention, and a variety of other services aimed at keeping data secure. But security, at its core, is a people process.

UTA_Aug2018_TheRuleOfThree-1.jpg

August 2018

The Rule of Three

The number three surrounds us. We find it in mathematics and science. Only three primary colors are needed to mix most other colors (red, yellow, blue). The three-act structure is the predominant model used in screenwriting (the setup, the confrontation, the resolution).

UTA_July2018_SocialMedia-1.jpg

July 2018

All about Social Media

The social media explosion over the last several years has created a cultural phenomenon where seemingly everything is documented. From dating apps to neighborhood watch groups, information has never been more accessible, nor has its life cycle been so infinite. What happens on the internet, stays on the internet.

UTA_June2018_TheCybercrimeIssue_REVISED-1.jpg

June 2018

The Cybercrime Issue

Last year, cybersecurity took center stage not just in boardrooms, but in the media. It’s not just a C-level concern, but something that affects every one of us, at both professional and personal levels. And if the first few months of 2018 are any indication, it’s not slowing down.

UTA_MAY2018_ProtectingSensitiveData_REVISED-1.jpg

May 2018

Protecting Sensitive Data

It seems like data breaches are always in the news. What can you do to protect the University's data as well as your own? Check out this month's newsletter to learn how to protect your data and privacy when storing, transferring, and even hot to safely destroy the data once it has reached its end of life.

UTA_APR2018_TheThreatConnection-1.jpg

April 2018

The Threat Connection

Cybercriminals target organizations of all shapes and sizes. But we also must contend with insider threats, whether they be accidental or malicious. Ensuring that sensitive information stays safe throughout its lifecycle means assessing our vulnerabilities both internally and externally.

UTA_MAR2018_GettingComfyWithCompliance-1.jpg

March 2018

Getting Comfy with Compliance

Whether you have to follow compliance mandates for work or not, across the globe we are all affected by their rules and regulations. Consider the amount of data you must provide for general services like utilities and health care. Have you ever wondered who has access to that data, or how it’s being protected?

UTA_FEB2018_CreatingSecurityCulture-1.jpg

February 2018

Creating a Security Culture

Every organization has a unique culture—a shared behavior that shapes the way employees and business partners interact with each other. One of the most important parts of that culture is security awareness.

UTA_JAN2018_PersonalProfessionalMobileNonTechnical-1.jpg

January 2018

Personal, Professional, and Mobile Non-Technical Security

The potential to have your data or the University's data compromised is real and can happen easier than you think! Someone trying to get access to the data may be able to without even getting to your computer. Check out this months newsletter to see how data can be stolen, and how you can prevent it.

Year

  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014

Information Security Office

Box 19800, Arlington, Texas 76019

Phone 817-272-5487 | Fax 817-272-2612

security@uta.edu

© 2022 The University of Texas at Arlington
Students | Faculty & Staff | Accessibility | Site Policies | Privacy and Legal Notice

Contact the webmaster