Information Security

Who We Are
UTC Information Security performs security activities to protect the university’s data, computers, networks, and users.
Some of these activities include:
- Develop policies, procedures and guidelines for securing university systems
- Consult with campus users and departments to investigate information security issues, perform risk assessments and propose products and processes to mitigate risk discovered
- Monitor the university networks to identify malicious activity
- Provide incident response for information security incidents
- Increase campus awareness of information security through training and communication
- Preserve the Confidentiality, Integrity and Availability (CIA) of university or personal information
Report an Incident
Call the Help Desk at 423-425-4000
Report suspected violations to: [email protected]
Learn more about safe behavior and our Acceptable Use Policy →
Training
[email protected] Awareness Training
All UTC faculty and staff are expected to complete annual security training through [email protected] (Knowledge and Training Excellence).
Security Presentations
Each calendar quarter the IT Security Team will hold an hour-long discussion in the University Center about relevant topics. Join us with your questions and reach out if you have a specific topic that you'd like us to cover.
For more information about the next topic and location, email [email protected].
Quick Read
Learn more about how to secure your information and avoid pitfalls online.
Schedule a Security Training Session for your Organization
Schedule a session for your department or organization by calling 423-425-4507.
IT Security News
Thieves Using Bluetooth Scanners to Pick Cars to Rob. – Leaving your laptop, phone, or tablet locked in your car trunk or under the seat is no longer sufficient to prevent detection by thieves. Using cheap USB scanners, the bad guys are now targeting cars that contain expensive portable devices that advertise bluetooth connections. All IOS devices try to turn bluetooth back on if you disable it after a set period of time.
Google’s Project Nightingale: Access to Patient Data of 2600 Hospitals – Google gets access to names, diagnosis, labs, and birth dates by teaming with Ascension. Google says it won’t be matching this data with any consumer data.
Microsoft to Apply California’s Privacy Law to All – A new law in California meant to inform users on how companies use their data will be applied globally to Microsoft US customers.
Windows Users: Update iTunes – Currently being used to spread malware.
DeepFake Vishing Costs Company $250k – A company has lost $243000 due to a fake, computer generated, call to an executive imitating someone they knew.
Foxit Software Breach – If you use Foxit software, such as the PDF reader, and you’ve registered with the company with a password, you need to change it.
SWAPGS: The Newest Speculative Execution Flaw for Intel CPUs (and Maybe AMD) – Another side channel attack. Microsoft patched it last month. AMD says its chips are not vulnerable.
Urgent/11, Critical Flaws in Embedded OS VXWorks – Researchers have found remotely exploitable flaws in the popular embedded OS VXWorks.