Skip to main content
  • About Us
    • Team Members
    • Our Teams
    • CISO's Biography
  • Forms and Policies
    • Forms
    • Policies
  • Training and Resources
    • Frequently Asked Questions
    • Report Phishing and Spam
    • Lock IT Down
    • Securing Zoom
    • Cybersecurity Videos
  • News and Alerts
  • Report Incident
  • Contact Us
DIRECTORY
MAPS
MYUTRGV
NEWS
GIVE
UTRGV UTRGV 10th Anniversary
The University of Texas
Rio Grande Valley
DIRECTORY
MAPS
MYUTRGV
News
GIVE
Open Search Menu
Menu
UTRGV 10th Anniversary
Information Security Office
Division of Finance and Business Affairs
  • About Us
    ▼
    About Us Square placeholder image 300px
    • About Us
      • Team Members
      • Our Teams
      • CISO's Biography
  • Forms and Policies
    ▼
    Forms and Policies Square placeholder image 300px
    • Forms and Policies
      • Forms
      • Policies
  • Training and Resources
    ▼
    Training and Resources Square placeholder image 300px
    • Training and Resources
      • Frequently Asked Questions
      • Report Phishing and Spam
      • Lock IT Down
      • Securing Zoom
      • Cybersecurity Videos
  • News and Alerts
  • Report Incident
  • Contact Us

Frequently Asked Questions

  1. Home
  2. Training and Resources
  3. Frequently Asked Questions

Answers to Frequently Asked Questions

Information Security Office Frequently Asked Questions are provided to assist members of the UTRGV community in understanding cybersecurity policies, best practices, and procedures.

These FAQs address common concerns related to data protection, incident reporting, and responsible use of university technology resources. The Information Security Office is committed to promoting a secure digital environment through education, awareness, and support. For additional assistance, please contact our team directly.

What is VPN?

VPN stands for Virtual Private Network. The Virtual Private Network at UTRGV is now needed to remotely gain access to office computers and other UTRGV resources using the Remote Desktop Connection program.

Why would I need to use VPN?

The most common reasons are:
  • Remote access to your office computer.
  • Approve employee time cards.
  • Change your direct deposit information.

How do I connect to University resources when I am not on campus?

You can access your office computer and other UTRGV resources out campus through VPN connection. To request this type of service refer to:

How to create a Virtual Private Network (VPN) Connection

I received a duo push notification, a call or an SMS on my phone asking to confirm VPN connection to the University. What does this mean?

If you did not attempt to authenticate to the VPN, this could mean that someone stole your user credentials. If this occurs, decline the two-factor request. Report the incident to the Information Security Office at 956-665-7124 and change your password immediately.

What is Spam?

Spam is the use of electronic messaging systems to send unsolicited -usually undesired- bulk messages indiscriminately. Some spam is merely annoying, while other spam can result in a number of very bad outcomes for unsuspecting recipients.

What is Phishing and how can I protect myself from it?

Phishing is a specific type of spam. Phishing or spoofing refer to deceitful or fraudulent emails designed to trick people to provide personal information that leaves them vulnerable to identity theft, computer viruses, and compromised email accounts. Avoiding the following things might help you stay safe:

  • Do not click on links within emails.
  • Locate your mouse over the link and it reveal the true URL to verify it is the original one.
  • Do not provide any personal or private information via email or through links sent to you in email.

Keep your anti-virus software consistently up-to-date and perform regular system scans.

How do I report suspicious email?

If you receive an email that you believe is extremely malicious, such as phishing email asking for your username and password, please forward the email to itdns@utrgv.edu

You will need to forward the entire message with full original headers.

See instructions at How to Forward Email with Full Headers

When you are authenticated, the server knows that you are you. Once the servers confirms your identity, it grants you access to the files and directories that you are authorized to see or change.

Note: Your authentication expires after a certain amount of time. In order to continue accessing your data, you will need to re-authenticate your user ID and password.

Information about an individual that identifies, links, relates, or is unique to, or describes him or her, e.g., a social security number, age, race, salary, home phone numbers, etc.

  • Avoid copying or downloading PII from the University's administrative systems to your desktop computer, web server, PDA, laptop, phone, USB Drive, or other storage media unless absolutely required. Ensure PII data is encrypted and properly secured.
  • Avoid creating databases or applications that use SSN as identifiers.
  • Do not send un-encrypted sensitive data via email. How to encrypt sensitive data via email
  • Periodically check hard disks and document backups to ensure that SSN or other sensitive personal data isn't included in old personnel files, employee lists, student grade rosters, etc.
  • Password protect data.
  • Physically protect devices that can be easily moved such as PDA or Laptop by locking in a secure area.

Passwords must be created to comply with the University's information security policy. This means a minimum of 8 characters with at least one non-alphabetic character. Passwords should not be individual dictionary words, common names, or sequences of numbers. "F4&yh10!" is an example of an acceptable password.

A longer password is a stronger password. Consider creating a password comprised of several unrelated words with numbers and special characters interspersed. This is often referred to as a pass-phrase. It is generally thought to be stronger and easier to remember than a traditional password. "L3ftFl0orCha1rBridg3#58" is an example of an acceptable pass-phrase.

You can also take a look at the video on How to create Strong Passwords:

If your university credentials have been compromised—meaning that another person has gained access to your university-related login and password, the ISO recommends the following:

  1. If your credentials were compromised due to the theft of university-owned equipment, such as a laptop, report an incident immediately.
  2. Change your UTRGV password.
  3. Log in to any other important online service accounts (banking, e-mail, etc.) and change your passwords.

  • Contact the project manager for the asset.
  • Contact Campus Police Department
    • Phones:
      • Edinburg Campus: (956) 665-7151
      • Brownsville Campus: (956) 882-8232
      • Website: www.utrgv.edu/police
  • Contact the Information Security Office
    • Phone: 956-665-7124
    • Website: www.utrgv.edu/is 
    • Email: is@utrgv.edu 

A Security Incident is an event where the confidentiality, integrity or availability of UTRGV has been affected or could potentially be affected. If you know or are notified of any please contact the Information Security Office as soon as possible.

  • Phone:(956) 665-7124
  • Online: Report Incident

What is Encryption?

Encryption is a way to send a message in code. The only person who can decode the message is the person with the correct key; to anyone else, the message looks like a random series of letters, numbers, and characters. Encryption is especially important if you are trying to send sensitive information that other people should not be able to access.

What is a full disk encryption and why is it important?

Full disk encryption is when the entire storage space on a computing device is encrypted. The purpose of whole disk encryption is to protect sensitive data that could be stored in a hard drive from unauthorized access in case the device is lost or stolen.

What is managed encryption?

Managed encryption provides centralized compliance reporting and key escrow. The encryption software communicates with a centralized server to provide information about encrypted state of the computer, provides a copy of the key for it, and sends/receives configuration information. Centralized compliance reporting helps provide Executive Management and UT System some assurance that computer devices are encrypted and remain encrypted.

Information Security Office


Edinburg

Email: is@utrgv.edu
Phone: (956) 665-7823
Fax: (956) 665-3154

UTRGV
  • CARES, CRRSAA and ARP Reporting
  • Site Policies
  • Required Links
  • Accreditation Statement
  • Fraud Reporting
  • Senate Bill 18
  • Clery Act Reports
  • Web Accessibility
  • Mental Health Resources
  • Sexual Misconduct Policy
  • Reporting Sexual Misconduct
  • Contact UTRGV
  • 1-844-ATUTRGV
  • Facebook
  • X Twitter
  • Instagram
  • LinkedIn
  • Academics
  • Admissions
  • Cost and Financial Aid
  • Student Life
  • Search Programs
  • First-Year Students
  • Transfer
  • International Students
  • Graduate Students
  • Current Students
  • Faculty Resources
  • Staff Resources
  • UTRGV Careers
  • Visit Campus
  • Directory
The University of Texas Rio Grande Valley