Search

Services

Policy Writing

The Information Security Office provides assistance in developing or tailoring departmental-specific information security policies. More Information...

System Auditing

The Information Security Office can audit systems to determine weaknesses in the operating systems. More Information...

Security Policy Violation Investigation

The Information Security Office helps gather electronic evidence to determine if any University information security policies have been violated. More Information...

Security Incident Response

If you suspect a system is compromised, believe an intrusion has occurred, or believe sensitive information has been placed at risk, please contact the Information Security Office as soon as possible at 747-6324 or email us at security@utep.edu. In order to expedite the investigation please provide as many details about an incident as possible. If you suspect a crime is being committed, please contact the UTEP Police Department at 747-5611. More Information...

Laptop Encryption

Portable devices, like laptops, are convenient but pose a significant risk in exposing sensitive information. Their portability allows staff and faculty to work from various locations and maintain continuity in their work environment. It is this portability however that puts laptops at risk of being stolen. One way to assure that a stolen laptop’s information remains confidential as well as secure is to encrypt its contents. More Information...

Security Awareness and Training On Request

Description coming soon...

Risk Assessments for UTEP servers

Protecting university-owned servers is an expensive and resource intensive endeavor. The ISO will continue to identify systems through a risk assessment process in order to provide an effective means for determining the level of security individual systems will requirement. More Information...

Web Application Scanning and Review (Penetration Testing)

As more applications are released on the web, it is imperative that all security risks and vulnerabilities are identified and mitigated. To assist with this, the ISO provides web application scanning and review services, also known as penetration testing, to identify sensitive information and ensure any vulnerabilities identified are corrected. More Information...

Spam and Antivirus Analysis

On occasion, a brand new computer virus, malicious software, or spam is encountered which poses a significant threat to university resources and its community. Because these threats are new they are usually not caught by antivirus programs or email spam filters. When this occurs, the ISO takes a proactive stance by capturing, isolating, analyzing, and in severe cases, engineering patches to eliminate these threats.More Information...

Anti-Virus and Malware Protection

The University currently employs Avast Endpoint Protection Suite as their anti-virus solution for all Windows system environments. Avast provides threat prevention and defends against malware for laptops, desktops, and servers.  More Information...

Data and Digital Research Classification Assistance

In order to maintain a successful research program and to comply with UTS165, all data owners are required to appropriately identify, classify, and protect sensitive Digital Research Data. The ISO will assist all researchers in reaching the compliancy necessary for protecting this data. More Information...

Digital Signatures for Secure EMail

InCommon Certificate Authority for secure email (Identity and Authentication) services are made available through the University for Official Use. This service allows individuals interested in this service to digitally sign their digital communications and validate that the transmission content has remained unaltered. More Information...

Identification Vetting

Any individual requesting this service will be required to undergo an identification verification process.  A valid government picture ID will need to be presented in person to the Chief Information Security Officer.

FUTURE: Faculty/Staff Computer Outreach Initiative

EMail Encryption Service

Email encryption services are being offered to all faculty and staff for the protection of confidential information.  The automated process will be initiated when the email gateway identifies Social Security Numbers (SSNs), as well as other confidential information, as email leaves the University.  Once identified, the system will automatically encrypt the message and send the information to the recipient.  The recipient will be required to set up an account through Cisco Registered Envelope Service (CRES) to unencrypt the message.  More Information..