Malicious programmers are constantly finding innovative ways to gain access to sensitive information through exploitation of weaknesses found in different systems. Security software can include protection features that attempt to nullify harmful attacks before they infect your computer or the network. These programs must be up-to-date to remain as effective as possible against exploitation.
The following links will help inform and educate users about the best practices and controls implemented by UT Health San Antonio to lessen the risk to institutional information, equipment and the software running on it.
State, Federal and UT System requirements mandate that all computers connecting to the network install and maintain an approved anti-malware product.
This is the process overview page for getting an exemption when a policy or requirement adversely impacts your business operations.
Limiting the effects of malware by restricting the available account permissions.
Information on setting up a secure network connection from off campus using a VPN. Includes information regarding remotely accessing your work computer.
Two-factor authentication (2FA), adds an additional layer of security to University computers.
A one-time portal login used to register computers, smartphones, and tablets.
All hardware and software platforms must be configured in a secure manner to ensure the confidentiality, integrity and availability of University resources.
This software automatically generates high-strength, random passwords and provides users with a secure digital vault that they can use to store and access their passwords from multiple devices.