Skip Content

The University of Texas at Arlington
menuMENU
  • Report an Incident
  • Home
  • Security Awareness
  • Policies and Standards
  • Risk Management
  • TX-RAMP
  • Contact Us
search
clear
news

Newsletter 2016

UTA_Dec2016_InDepthPII-1.jpg

December 2016

What is PII?

PII stands for Personally Identifiable Information. But what info is considered PII? And what info isn’t considered PII? Those can be tough questions to answer. PII is any data that can be used to specifically identify an individual. But that’s rather vague and can be confusing. In this issue we will clear up these questions and more.

UTA_November2016_HorrorsOfMalware-1.jpg

November 2016

Horrors of Malware

Malware is any malicious software, script or code installed on a computer that alters its function in some manner without permission. It might be malicious or it might not be. Malware comes in all shapes and sizes and can go undetected for long periods of time.

UTA_Oct2016_SurfsUp-1.jpg

October 2016

Safe Surfing

From our homes to our mobile devices to our computers at work, we are connected, we are surfing. If we’re not doing it safely, we can easily drown in a sea of malware, spyware, viruses and even identity theft.

UTA_Sep2016_InsiderThreatsAPTs-DataBreachesOhMy-1.jpg

September 2016

Insider Threats and Data Breaches

E-commerce has taken over the way we do business, which means there’s a lot of sensitive information being exchanged. This opens more doors for criminals. Instead of going after goods and services, they can target our data (and yours) without even leaving home. The worst thing any of us can do is assume we’re not a target.

UTA_Aug2016_MobiletheCloud-1.jpg

August 2016

Mobile in the Cloud

Because of mobile devices and the cloud, we live in a world of constant access. Which means we need to be constantly vigilant to avoid scammers. Do you know what to do if you lose your smartphone? Do you know what data Google collects on you?

UTA_July2016_CIATriad-1.jpg

July 2016

The CIA Triad

The CIA Triad is one part Confidentiality, one part Integrity and one part Availability. As a whole, it is the single most crucial element to protecting sensitive data. Failure at any one level can lead to failure at every level. It’s our duty to not only keep data private, but also make sure it is consistently accurate and accessible for authorized users.

UTA_June2016_LivingAHealthyCyberlife-1.jpg

June 2016

Living a Healthy Cyberlife

Maintaining a healthy life-style is a challenge even for the best of us. Our busy lives make it difficult to eat right, exercise regularly and get enough sleep. But, when we make a habit out of all of those things, it comes a bit more naturally. In this issue we want to help you achieve a healthy cyberlife by practicing good security habits on a regular basis.

UTA_May2016_SpamScamsHackingYou-1.jpg

May 2016

Spam, Scams & Hacking You on Social Media

Your email, LinkedIn, Facebook, (all social media) and even your text messages can pose potential security threats. With a little security awareness you can learn to identify and avoid such threats by using simple common sense and easy to follow security practices.

UTA_Apr2016_PersonalSecurity-1.jpg

April 2016

Personal & Home Network Security

The path to great security awareness doesn’t begin and end at work, you must also be vigilant at home and in your personal lives. In this issue we discuss the steps you can take to protect your home network and PII (personally identifiable information), and what steps can be taken to avoid ransomware.

UTA_Mar2016Newsletter_DataClassification-1.jpg

March 2016

The Secrets of Data Classification

Data classification is essential to our everyday lives, both at work and at home. In general, data can be classified into one of four sensitivity levels: public, internal use, regulated and confidential or top secret. Do you know the sensitivity levels of the data you handle at work? How do you handle your personal data at home?

UTA_Feb2016_ThreeDomains-1.jpg

February 2016

The Three Domains of Security

People remember things best in groups of three. In this issue, we are exploring in depth the Three Domains Triad, which consists of the Cyber, Physical, and Human domains. Each domain has its own unique security risks that a security savvy person must be aware of and prepared for.

UTA_JanNewsletter2016_Top10_revised-1.jpg

January 2016

Security Awareness Top 10

If you could only have one food for the rest of your life, what would it be? What are your three top wishes? What are your Top-10 best security behavior and practices at work and at home? In this issue, we even take Top-10s further, by introducing the Top-10 of Security Top-10s!

Year

  • 2023
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016

Information Security Office

Box 19800, Arlington, Texas 76019

Phone 817-272-5487 | Fax 817-272-2612

security@uta.edu

© 2022 The University of Texas at Arlington
Students | Faculty & Staff | Accessibility | Site Policies | Privacy and Legal Notice

Contact the webmaster