Skip Content

The University of Texas at Arlington
menuMENU
  • Report an Incident
  • Home
  • Security Awareness
  • Policies and Standards
  • Risk Management
  • TX-RAMP
  • Contact Us
search
clear
news

Newsletter 2019

UTA_Dec2019_Passwords_and_Access.pdf.jpg
December 2019 Newsletter

While the technical side of cybersecurity, such as firewalls and threat detection services, helps contain various attacks, it’s the human side that poses the most risk. Social engineers know how to manipulate emotions and use them against the victim. Cons and scams work because humans will always have vulnerabilities that cannot be patched by a software update. This edition ends the year by showcasing real-world examples of social engineering attacks and how they can be prevented.

UTA_Nov2019_MalwarePhishingAndOtherLurkingThreats.jpg
November 2019 Newsletter

Security threats come from everywhere. Detecting those threats before they cause damage is paramount to an organization’s success. Even though some threat detections require technical skills, the ultimate threat detection is you--the human firewall. This month’s newsletter addresses the who, what, and why of enterprise threat detection and highlights two major threats: BEC and ransomware

Oct2019NL_LivingTheHumanFirewallLife.jpg
October 2019 Newsletter

Being a human firewall is more than just not clicking on obvious phishing links; it’s a lifestyle choice that improves overall security no matter where you go or what you do. This issue examines the five traits that human firewalls exhibit in their personal and professional lives, as well as seven tools that every human firewall can keep in their metaphorical utility belt. We spend a bit more time looking at the importance of incident reporting and the types of security events that you need to report.

UTA_September 2019.jpg
September 2019 Newsletter

Cybercrime is something that impacts everyone, both professionally and personally. At work, a data breach could permanently damage an organization’s reputation and result in lawsuits and fines. On an individual level, when our sensitive info ends up in the wrong hands, it could lead to identify theft and additional cyber-attacks. This month’s newsletter identifies how data breaches happen, their impact on us personally, and what we can do to prevent cybercrime at work, at home, and on the go.

August 2019 newsletter_Page_1.jpg
August 2019 Newsletter

We live in a connected world where sensitive data has effectively become currency. As such, understanding how to protect that information has become an imperative part of our daily routines. This month’s newsletter covers the importance of data classification, then dives into what cybercriminals do with stolen data, and wraps up with compliance regulations and their impact on our lives both professionally and personally.

UTAJuly-2019Newsletter_CreatingaSecurityForwardCulture_Page_1.jpg
July 2019 Newsletter

Culture traditionally refers to the shared customs, arts, and other characteristics of specific groups of people. Similarly, the security awareness culture of an organization refers to the shared human effort of information security. Creating a culture of security aware individuals requires the participation of every employee, from executives to the front desk. In this month’s newsletter, we examine the steps that everyone can take to improve culture and put security first in the workplace.

UTA_June2019_GoodDeviceHygiene.jpg
June 2019 Newsletter

Like automobiles, buildings, and our own bodies, devices require a bit of maintenance. Ignoring simple actions, such as updating apps and deleting/organizing files, not only leads to degraded performance, it also invites security risks. In this edition, we focus on those risks and highlight how they can be avoided both at work and at home.

UTA_May2019_TakingSecurityPersonally.jpg
May 2019 Newsletter

To build a culture of strong human firewalls, it’s important to prioritize not just organizational security, but personal security as well. That’s why this month’s newsletter takes on a personal focus by covering how to protect your family online, how to secure home networks, and what it means to properly maintain mobile devices. When security receives precedence in all facets of life, both organizations and individuals improve their resistance to cybercrime.

April2019_PrivacyPIIandIDTheft_Page_1.jpg
April 2019 Newsletter

How do you prevent data breaches at work? What do you do if your personal data is involved in a breach? Is it possible to maintain privacy in a constantly connected world so immersed in technology? In this issue, we address these questions and uncover solutions for maintaining security at work, at home, and on the go. It begins with a field guide to PII, continues with five steps for preventing identity theft, and ends by identifying the most common causes of data breaches—all while highlighting the non-technical, human side of protecting data!

UTA_NL-2019-March-EN-NM_TheSimpleSideofSecurity.png
March 2019 Newsletter

Security doesn’t require a robust understanding of networks and computers. Most of it comes down to non-technical actions and using common sense! In this edition, we jump into the simple side of security with a quick overview of what it means to use non-technical security awareness, and why it’s important to separate your professional life from your private life (such as with BYOD, or bring your own device). We wrap things up in the physical world by highlighting a few real-life examples of physical security events.

UTA_Feb-2019Newsletter_TheComprehensiveGuidetoSecurityAwareness.png
Feb 2019 Newsletter

Comprehensive Guide to Security Awareness: Kick the year off with a comprehensive overview of how to prioritize security awareness in your life, both personally and professionally. This guide digs into the specifics of what it means to be a strong human firewall, and why we place so much value on things like strong password practices and following policy.

UTA_NL-2019-JAN-EN-NM_BeingMobile-1.jpg
Jan 2019 Newsletter

Today, mobile refers to a massive web of connected devices (the Internet of Things, or IoT). It isn’t about simply having access while on-the-go. It’s about having control of nearly everything from the convenience of a smart device that fits in your pocket or straps to your wrist. Unfortunately, lost in this world of smart connections is the prioritization of security. New technology rarely comes stocked with features that improve resistance to cybercrime. Quite the opposite, in fact.

Year

  • 2023
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016

Information Security Office

Box 19800, Arlington, Texas 76019

Phone 817-272-5487 | Fax 817-272-2612

security@uta.edu

© 2022 The University of Texas at Arlington
Students | Faculty & Staff | Accessibility | Site Policies | Privacy and Legal Notice

Contact the webmaster