Main page content
Monday, Jan. 2, 2017, is a banking holiday observed by the Federal Reserve and most financial institutions.
According to state law, Jan. 2 is considered the first working day following the December 2016 pay period, making it pay day for full-time employees paid on a monthly basis.
As a result, payroll paychecks (paper checks and direct deposits) will be dated Jan. 2, 2017. While direct deposit payments will be transmitted to financial institutions before and with the payment date of Jan. 2, those institutions are not required to post payments on the…
Q: Could we have a place with a salad bar/potato bar/bar in the building?
Phishing campaigns that try to dupe consumers into giving away personal and financial information tend to rise during the holiday season, use the following tips to prevent falling victim to cyber criminals.
If an offer looks too good to be true, it probably is.
A common tactic by cyber criminals is using extremely low prices on popular items, such as electronics, to lure in potential victims.
Use a credit card instead of a debit card.
If your credit card data is used for something nefarious, it’s easier to resolve issues with a credit card company than with your…
Each new data breach and phishing scam alert is accompanied by a wave of cyber security articles and commentary. The tone of these stories can range from panicked to apathetic. But the facts can't be ignored: identity theft is an epidemic in the United States. According to TransUnion, 19 people fall victim to identity theft every minute.
We can't prevent hackers from attacking technology, but we can arm ourselves with knowledge and habits to help keep our personal information safe from criminals. Let's get the facts straight. Here are the top ten myths about identity theft and, more…
On September 2, 2016, the Chancellor shared with System Administration that the Board of Regents approved the FY 2017 UT System operating budget with instructions to reduce the number of full-time equivalent (FTE) employees by at least 130 positions. In the same communication, System Administration was invited to submit questions regarding the process to OESQuestions@utsystem.edu . Questions have been submitted and the website created. The website will continue to be updated as additional questions are submitted and answers…
“The Cloud” can mean different things to different people, but usually means using a service provider on the Internet to store and manage your computing systems and/or data for you. An advantage of the Cloud is that you can easily access and synchronize your data from multiple devices anywhere in the world, and you can also share your information with anyone you want. We call these services “The Cloud” because you often do not know where your data is physically stored. Examples of Cloud computing include creating documents on Google Docs, sharing files via Dropbox, setting up your own…
As technology gains a more important role in our lives, it also grows in complexity. Given how quickly technology changes, keeping up with security advice can be confusing. It seems like there is always new guidance on what you should or should not be doing. However, while the details of how to stay secure may change over time, there are fundamental things you can always do to protect yourself. Regardless of what technology you are using, or where you are using it, we recommend the following four key steps:
Recognize that you are a target to cyber criminals. And keep in mind…
If you haven’t been following this topic in Idea Central, we had a request for bike lockers in the new building. Bike lockers look like this:
While a location and budget for actual lockers wasn’t in the plans, we did expect to have bike racks in the basement parking area. The basement garage is a secure parking area with a roll down gate. With…
During the data collection phase of the organizational assessment, we learned requests for data and information to UT System institutions from UT System Administration are a significant burden. Reducing and streamlining those requests would be an important action to take.
In order to take that action, UT System Administration has created an online process. All requests for data and information must be sent through this online process. Following the submission of the request, the Office of Strategic Initiatives will respond within 5 days to determine whether the…
Welcome to Week 2 National Cyber Security Awareness Month! The second of our weekly cyber security topics is “Creating a Culture of Cybersecurity in the Workplace.”
The Internet has become an indispensable tool assisting in so many ways, from reaching new customers to enabling the mobile workforce to do its job. But being constantly connected increases the risk of online theft, fraud and abuse.
Protect Your Workspace
The Symantec 2016 Internet Security Threat Report revealed that in 2015, there was a record-setting total of nine mega-breaches, and the reported number…
The Texas Legislature has mandated all new state employees receive training on sexual harassment and equal employment opportunity during the initial 30 days of employment and supplemental training every two years thereafter. In addition, the Texas Administrative Code 202 requires periodic training on the secure use of information resources. To adhere to these mandates, a Bi-Annual Compliance Training module will be placed on the Learning Zone on October 3, 2016.
All UT System Administration employees (with the exception of new hires within the last 6 months) will receive…
Governor Abbott has declared October to be Cybersecurity Awareness Month for the state of Texas. The Texas Department of Information Resources (DIR) is hosting three speaker sessions that focus on information security. These sessions are open to ALL employees at state agencies and institutions of higher education. In addition, the session on October 19 is open to the general public as well. The sessions are listed below (with registration links). Additional details on the sessions can be found in the by clicking on the titles below.
UT System pilots, Jeff Perkins and Dave Crosby, have each been awarded the National Business Aviation Associations (NBAA) Dr. Tony Kern Professionalism in Business Aviation Award. The award honors individuals for outstanding professionalism and leadership in support of aviation safety. Criteria for the award included professional ethics, vocational excellence, continuous improvement, professional engagement, professional image and selflessness. Dave and Jeff will be recognized along with their peers at the NBAA national convention later this year.
The Office of Information Security is excited to announce that October is National Cyber Security Awareness Month (NCSAM). NCSAM is spearheaded by the U.S. Department of Homeland Security and the National Cyber Security Alliance (NCSA). It is a collaborative effort among educational institutions, government, and businesses to promote Internet safety and data security.
Throughout the month of October, we will be providing a variety of resources to help you better understand cyber security and the steps you can take to protect yourself, your family, and our organization. …
Last week, the IRS sent two notices/alerts about criminals sending out fake IRS tax bills related to the Affordable Care Act to defraud taxpayers. Below is an excerpt:
This scam may arrive by email, as an attachment, or by mail. It has many signs of being a fake:
- The CP2000 notices appear to be issued from an Austin, Texas, address;
- The letter says the issue is related to the Affordable Care Act and requests information regarding 2014 coverage;
- The payment voucher lists the letter number as 105C;
- Requests checks made out to I.R.S. and…
Please see below for upcoming CPR/AED and First Aid Classes:
Adult, Child, & Infant CPR/AED
Thursday, October 27, 2016 8am-1pm
Wednesday, November 30, 2016 8am-1pm
- Thursday, October 27, 2016 1:30pm-4:30pm
- Wednesday, November 30, 2016 1:30pm-4:30pm
To sign up go to https://apps.utsystem.edu/ORMTraining/TrainList.aspx
Construction continues at a brisk pace on the new UT System Building!
Curtainwall construction has started on the roof level and there is work on every floor. Paint primer has started! Wall tile has started!
Progress on our new building continues at a steady pace. Here is a picture from Colorado & 7th Street.
The curtainwall has reached the 19th floor, the chillers have been set on the rooftop, construction on the mechanical penthouse is well underway, and…
Email is still one of the primary ways we communicate, both in our personal and professional lives. However, we can quite often be our own worst enemy when using email. In this newsletter, we will explain the most common mistakes people make with email and how you can avoid them in your day-to-day lives https://securingthehuman.sans.org/newsletters/ouch/issues/OUCH-201609_en.pdf…
The construction site is busy as a beehive! The curtainwall installation has made its way to the 18th floor. There is significant construction activity on every floor including electrical, mechanical, and plumbing rough-in (pipes, conduit, fittings), metal stud installation, sheetrock, tap and float, and the instllation of the elevators has started. There will be internet and telecom presence by the end of the year!...