Skip to content

Office of Cybersecurity

Phishing Emails

Concerned about Phishing Emails? Our campus is being targeted by gift card scam phishing attacks. Visit our Phishing Emails  page to see some examples of the gift card scams and read some advise from Dennis Leber, CISO on how to spot the phish. Forward suspicious emails to

Duo Two-Factor Authentication

Passwords aren’t getting the job done to protect the university and you against cyber attacks.  Learn more about Duo.

The Office of Cybersecurity serves as fundamental technical safeguard for UTHSC. We promote an environment of great ethical standards and observe numerous regulatory risks by:

  • Advancing effective ways to prevent security risk through collaboration
  • Educating employees and the student body about information security
  • Identifying security risks faced by the University.
  • Encouraging an ethical environment that encourages information security preventions
  • Promoting awareness of information security through outreaching events
  • Effective training in the numerous areas of information security
  • Providing a workplace that enables employees to participate in the compliance program without fear of retribution.

Top Ten Tips

  1. What to Report: Anything suspicious!
  2. Protect Yourself: Safe computer practices to follow.
  3. Get the Training: The more you know, the better.
  4. Keep Current: Update your operating systems and software
  5. Secure Your Device: Lock it up!
  6. Play It Safe: How we help keep your devices protected.
  7. Password Managment: Everything you need in one place.
  8. Encrypt Your Email: Sending and Receiving the right way.
  9. Confidential/Classified Information: What it includes and examples
  10. Phishing: Know what it is and how to avoid it!

Phind the Phish

Phishing occurs when an email seems legit, but it is actually trying to trick you into giving away your passwords or personal information. Don't fall for phishing!

Our Team

Dennis Leber
Chief Information Security Officer (CISO)

Cybersecurity Operations

Ammar Ammar

Vulnerability & Patch Management

Justin Self
Cybersecurity Analyst

Cybersecurity Analyst

Network & Endpoint Protection

Sarah Johnsen-Self
Cybersecurity Analyst

DevSecOps & Systems Management

Will Irby
Cybersecurity Analyst

Cybersecurity Governance

Risk Management, Audit, and Outreach Management

Chris Madeksho
Lead Cybersecurity Analyst

Security Architect

Last Published: Jul 17, 2020