Top Tips for Email Security
Don't believe everything you see.
Learn how to recognize phishing and scam emails.
Information Security strives to deliver and maintain an integrated information security program that safeguards the University’s information assets against unauthorized use, disclosure, modification, damage or loss and supports the University’s strategic goals and priorities.
Each member of the University community has a responsibility to safeguard the information assets entrusted to us. ÂÌÅ«Ì컨°å's security awareness program will better prepare all of us to fulfill this responsibility and to strengthen our defenses against future attacks. Adopting behaviors that protect information benefits the University, and can benefit you and your family, as well. Security awareness at the University is provided by KnowBe4. Access to the training videos can be accessed through theÌýMyÂÌÅ«Ì컨°åampaÌýportal and by clicking on the KnowBe4 icon.
A comprehensive security program is accomplished through developing information security policies and robust data protection procedures, completing recurring security and compliance reviews, assisting campus departments with resolving information security challenges, implementing technical measures to protect campus resources, promoting a ‘culture’ of information security awareness and developing mechanisms to react proactively to incidents and events that endanger the University’s information assets.
Services
Information Security offers the following services:
- MyÂÌÅ«Ì컨°åampa, single sign-on for ÂÌÅ«Ì컨°å student SpartanMail, SpartanLearn (powered by Canvas), Workday and more
- Spartan Secure, a student-centric information security awareness program
- Information security awareness training for staff, faculty and students
- Third-party contract reviews and enterprise vendor oversight
- ISO/IEC 27000 gap analysis of IT controls
- Information security policy development
- Computer security and incident response
- Enterprise risk management
- Information security planning
- Data protection and encryption
- Vulnerability management
- Forensics investigations
- Security reviews
- Network security
- Email security
- Ìý(Okta Verify app)
Policies
- Acceptable Use Policy (PDF)
- Information Classification and Protection Policy (PDF)
- Third-Party Service Provider Security Reviews Policy (PDF)
- Information Security Management System Policy (PDF)
- Business Continuity Management Policy (PDF)
- Service Management System Policy (PDF)
Security Awareness Resources
Contact
Location: TECH Building 381C
Phone: (813) 257-3950
Fax: (813) 257-8800
·¡³¾²¹¾±±ô:Ìýinfosec@ut.edu