Services
Policy Writing
The Information Security Office provides assistance in developing or tailoring departmental-specific information security policies. More Information...
System Auditing
The Information Security Office can audit systems to determine weaknesses in the operating systems. More Information...
Security Policy Violation Investigation
The Information Security Office helps gather electronic evidence to determine if any University information security policies have been violated. More Information...
Security Incident Response
If you suspect a system is compromised, believe an intrusion has occurred, or believe sensitive information has been placed at risk, please contact the Information Security Office as soon as possible at 747-6324 or email us at security@utep.edu. In order to expedite the investigation please provide as many details about an incident as possible. If you suspect a crime is being committed, please contact the UTEP Police Department at 747-5611. More Information...
Laptop Encryption
Portable devices, like laptops, are convenient but pose a significant risk in exposing sensitive information. Their portability allows staff and faculty to work from various locations and maintain continuity in their work environment. It is this portability however that puts laptops at risk of being stolen. One way to assure that a stolen laptop’s information remains confidential as well as secure is to encrypt its contents. More Information...
Laptop/Desktop Encryption
Security Awareness and Training on Request
Security Awareness is vital in today’s environment because of the increase in identity theft, phishing scams, and malicious software such as viruses and spyware. This has a tremendous impact in the way we use and protect our information. Our main goal is to raise awareness of these issues in the hopes of educating people in this ever increasingly electronic world. More Information...
Risk Assessments for UTEP Servers
Protecting university-owned servers is an expensive and resource intensive endeavor. The ISO will continue to identify systems through a risk assessment process in order to provide an effective means for determining the level of security individual systems will requirement. More Information...
Web Application Scanning and Review (Penetration Testing)
As more applications are released on the web, it is imperative that all security risks and vulnerabilities are identified and mitigated. To assist with this, the ISO provides web application scanning and review services, also known as penetration testing, to identify sensitive information and ensure any vulnerabilities identified are corrected. More Information...
Spam and Antivirus Analysis
On occasion, a brand new computer virus, malicious software, or spam is encountered which poses a significant threat to university resources and its community. Because these threats are new they are usually not caught by antivirus programs or email spam filters. When this occurs, the ISO takes a proactive stance by capturing, isolating, analyzing, and in severe cases, engineering patches to eliminate these threats. More Information...
Anti-Virus and Malware Protection
The University currently employs Bitdefender Endpoint Security as their anti-virus solution for all Windows/Mac/Linux system environments. Bitdefender provides threat prevention and defends against malware for laptops, desktops, and servers. More Information...
Data and Digital Research Classification Assistance
In order to maintain a successful research program and to comply with UTS165, all data owners are required to appropriately identify, classify, and protect sensitive Digital Research Data. The ISO will assist all researchers in reaching the compliancy necessary for protecting this data. More Information...
Digital Signatures for Secure Email
InCommon Certificate Authority for secure email (Identity and Authentication) services are made available through the University for Official Use. This service allows individuals interested in this service to digitally sign their digital communications and validate that the transmission content has remained unaltered. More Information...
Identification Vetting
Any individual requesting this service will be required to undergo an identification verification process. A valid government picture ID will need to be presented in person to the Chief Information Security Officer. Please contact the UTEP Information Security Office at security@utep.edu for more information.
E-mail Encryption Service
Email encryption services are being offered to all faculty and staff for the protection of confidential information. The automated process will be initiated when the email gateway identifies Social Security Numbers (SSNs), as well as other confidential information, as email leaves the University. Once identified, the system will automatically encrypt the message and send the information to the recipient. The recipient will be required to set up an account through Cisco Registered Envelope Service (CRES) to unencrypt the message. More Information..