Featured Stories


University Policy 808, Protection of University Data and Information updates and requirements

Recent headlines continue to show increased attacks designed to gain access to our accounts and internal resources, including the private information of members of our community.

Thursday, Oct. 31, 2019

Traveling with Technology

You may not be aware that traveling internationally greatly increases the risk of your information and device data being compromised, whether through theft or intrusion. These risks need to be evaluated, mitigated, and wherever possible avoided.

Recent news articles have reported a coordinated, crippling ransomware attack against over 20 Texas local government entities.  The goal of this attack is likely to hold information hostage and interrupt normal operations unless the attackers are paid. 


Featured Stories


A padlock surrounded by data points and directional arrows

Requirements for New IT-Based Services Wednesday, Sep. 9, 2020

University Policy 808, Protection of University Data and Information updates and requirements


Icon of a hand shielding a stream of data characters, blocking its path

Importance of Protecting Private Information Monday, Aug. 3, 2020

Recent headlines continue to show increased attacks designed to gain access to our accounts and internal resources, including the private information of members of our community.


Traveling with Technology

Traveling with Technology Thursday, Oct. 31, 2019

You may not be aware that traveling internationally greatly increases the risk of your information and device data being compromised, whether through theft or intrusion. These risks need to be evaluated, mitigated, and wherever possible avoided.


Ransomware Affecting Multiple Local Government Agencies in Texas

Ransomware Affecting Multiple Local Government Agencies in Texas Tuesday, Aug. 20, 2019

Recent news articles have reported a coordinated, crippling ransomware attack against over 20 Texas local government entities.  The goal of this attack is likely to hold information hostage and interrupt normal operations unless the attackers are paid.