IT Security

Reporting to the Vice President CIO/CTO, the goal of the Information Security Office is to protect confidentiality, integrity, and availability of information technology resources and assets at The University of Toledo. Protection of these resources allows the university to reach designated educational, operational and research goals.  All University members share responsibility to help achieve the University mission. Some of the services our office provides are:

  • Security risk assessments/reviews
  • Vulnerability assessment and remediation consultation
  • Incident response
  • Security Awareness
  • SPAM identification










Many scams are ones you can prevent by just knowing what to listen and look for.  Every scam, no matter how sophisticated or how amateur, there are two red flags:  I’m going to ask you for money—wire me the money immediately—or I’m going to ask you for information—what’s your Social Security number?  Knowing this can prevent a lot of scams.

security alerts
  • Action Required Scam Emails - A number of people have received emails telling them that they are being notified that someone has logged into their email from another device.  The email asks that you confirm your account by clicking on the link.  Do not click on the link and provide your personal information. 
  • Part Time Job Offer Scam Emails - A number of people have received emails telling them about a fake insurance job they have available and to click on the link below to apply.  Unexpected job offers are often scams.  Do not click on the link and provide your personal information. 
  • Gift Card Scam Emails - We continue to be made aware that emails about gift cards continue to populate inboxes.  This is just a reminder to continue being alert to these scams and do not respond to it.  Visit our phishing page to see past phishing emails.
  • Nanny/Babysitting Scam - A recent attempt to offer a nanny or babysitting job.
A few handy tips to help keep you safe online
  • If you receive an email and you do not know the sender, do not click on hyperlinks inside the email or open any files attached to the message.
  • Be wary of links to websites you do not recognize, or links with mismatching link URL and descriptive test.
  • Enroll in UT's 2-step authentication service to help protect sensitive employee MyUT pages from unauthorized access.
  • Maintain control of your account by keeping your contact information up to date on the MyUT portal and on the myutaccount websites.  2-step Authentication Instructions
  • To report a suspicious e-mail, use the "Phishing/Spam" button in Microsoft Outlook or forward the suspicious message to (from any mail-enabled device).
  • Avoid strangers, check name and email address.
  • Don't rush, be suspicious of emails marked "urgent".
  • Notice mistakes in spelling and grammar.
  • Beware of generic greetings, "dear sir/ma'am".
  • Don't be lured by incredible "deals".
  • Hover over the link before you click to ensure it has a secure URL (https://).
  • Never give out personal or financial information based on an email request.
  • Don't trust links or attachments in unsolicited emails.
  • If you believe your computer has been infected by a virus, or if you have other important account or system security questions, contact the IT Help Desk:  Telephone: 419.530.2400 (MC) or 419.383.2400 (HSC).  E-mail:  
Last Updated: 4/21/20