Explore Information Security Resources
Account security and password strength requirements and best practices
Guidelines for making data unreadable and/or secure to unauthorized users
UT Southwestern's Information Security and Privacy Steering Committee
ISAC governs the acquisition of information systems, related equipment, and software
Report lost or stolen devices to safeguard protected information
UT Southwestern guidelines for information security practices
Safeguard your password and avoid malware, ransomware, and phishing
Information security training required for new and established employees
Workstation and server best practices and common-sense tips to prevent security breaches
Meet the team that serves your information security needs
Notice something suspicious on your computer?
Trust your instincts, and reach out for help right away via phone at 214-648-7600.
Top Tasks
Reset Password Two-factor Authentication Policies ISAC Meetings & Deadlines ISAC Previously Reviewed Software
By the Numbers
UT Southwestern Data Highlights
30 million+
Network security events that are detected annually
15,900+
Malicious and unwanted programs blocked monthly
10,000
Phishing and malicious emails blocked daily
Worldwide Data Highlights
40 million+
Worldwide patient records exposed in 2021 due to cybercrime driven data breaches – View Details
80%
Reported security incidents that are phishing attacks – View Details
18,000+
New vulnerabilities discovered in worldwide systems in 2021 – View Details
Questions about information security?
Office of Information Security
informationsecurity@utsouthwestern.edu