System Administration Information Security Program
Under the guidance of the U.T. System Chief Information Security Officer, the U.T. System Administration Information Security Program works to ensure the following:
- risk to System Administration information assets is reduced;
- System Administration information resources are secured against unauthorized use, disclosure, modification, damage or loss;
- System Administration information security program goals and objectives are documented and verifiable, and meet regulatory and U.T. System compliance requirements.
Phishing Simulations (login required)
April 2020: "Join meeting now."
February 2020: "Happy Valentine's Day from UT System!"
January 2020: "Jessica's invitation is awaiting your response"
December 2019: "Accounts scheduled for deletion"
November 2019: "Your data may have been accessed illegally"
September 2019: "Scan from \ROIPrint\MyScans"
August 2019: "Account Security Alert"
July 2019: "Thank you for your great work!"
June 2019: "Your inbox is over the limit"
May 2019: "Your order has been processed"
April 2019: "Scan from Laser Pro i780 Second Floor"
March 2019: "Password Review"
February 2019: "Package Undeliverable"
ISO Monthly Newsletters
December 2019: Deck the Halls with Strong Passwords
November 2019: Cloud Security
October 2020: Meet Our Security Staff
September 2019: Acceptable Use of Information Resources
August 2019: Social Media
July 2019: Encryption
June 2019: Working Remotely
May 2019: Information Security While on Vacation
April 2019: Mobile Device Protection
March 2019: Cloud Storage
February 2019: What Is Identity Theft?
January 2019: Passwords are the Foundation of Safeguarding Data
December 2018: 'Tis the Season for Holiday Phishing Scams
SANS Ouch! Security Awareness Newsletter
March 2020: Digital Spring Cleaning
February 2020: Social Media Privacy
January 2020: Digital Inheritance
December 2019: Messaging/Smishing Attacks
November 2019: Shopping Online Securely
October 2019: Four Simple Steps to Staying Secure
September 2019: Scamming Through Social Media
August 2019: Got Backups?
July 2019: Virtual Private Networks (VPN)
June 2019: The Dark Web
May 2019: A Career in CyberSecurity
April 2019: Making Passwords Simple
March 2019: Disposing of Your Mobile Device
February 2019: Personalized Scams
January 2019: Search Yourself Online