
Regular backups are critical for recovering and restoring data that has been lost or stolen. It is important to protect the Institute’s data by backing up your data regularly and…
Regular backups are critical for recovering and restoring data that has been lost or stolen. It is important to protect the Institute’s data by backing up your data regularly and…
Ransomware is becoming one of the most widely-known types of cyber attacks today. It is malware that uses asymmetric encryption, or cryptography that uses a pair of keys to encrypt…
Spear phishing seems to be a never-ending threat. In fact, a new version is making its way through the Institute. The newest message differs in the subject and content of…
I am beginning to see a few versions of this phishing scam, but they are all attempts to steal your password. The message may come from MS – Utk –…
f you are a UT merchant employee, you are required to take PCI training on an at least annual basis, per UTIA IT0311 –Payment Card Industry (PCI) Security Plan and…
Recommended Settings for Secure Sessions/Meetings Please keep in mind that not all sessions/meetings are the same so what works for a smaller session might not work for a larger session…
Cyber blackmail is a growing attack vector used to scare the recipient of the associated email.Here is what you need to know about cyber blackmail: This email will tell you…