Information Security Office
Incident Reporting
Help protect information resources by reporting exposure, loss, or compromise of university data and systems.
Security Services
Start a software or hardware security assessment, network vulnerability scan, or request other security services.
Law - Policies - Guidelines
The Information Security Office strives to ensure that TXST users are able to get answers and resolutions quickly. There are laws, policies, standards and guidelines to consider when evaluating or implementing new services, all of which may impact timelines and security requirements. Take some time to familiarize yourself with how these processes work and what is required of you when requesting service procurements.


Cybersecurity Awareness Month
Every October is National Cybersecurity Awareness Month. Join us for guest speakers, games, and more. This year, we are joined by special guest speaker, H.D. Moore, founder of the Metasploit Project.
Security Training
If you know you need extra security training because you are a Level 2 Information Resource Employee, or just want to learn how to be more secure, you can find it here. The ISO runs a trimester-based training schedule for all TXST users.


All Services and Tools
The ISO offers a wide variety of services and security tools to faculty, staff, and students. Discover what we offer and how we can help. Finding what you need is just a click away.
Phishing Awareness
Find out about the latest phishing on campus, get tips and tricks to avoid scams, and power up your digital critical thinking skills to be harder for the cyber criminals to catch.

Information Security Glossary
The information security glossary is a searchable and filterable glossary of terms and definitions we use in all aspects of our work. Familiarize yourself with this terminology to deepen your understanding of information security at Texas State University.
Expand All Content
Aggressive Phishing Attacks via Forms
March 18, 2021
Most of the time, we think of phishing attacks as something delivered through email, text, or voicemail. And this is true, for the most part, but there are other clever ways attackers can leverage a target’s implicit trust – and that is by using their own forms against them. Form Phishing Attack An attack vector…
Identity Theft and Social Engineering
November 18, 2020
Cyber criminals are often able to derive identities of victims by aggregating data from different sources. This could be done by collecting lists of known accounts and comparing them with other identifying information, or other more involved surveillance. Rarely do attackers move so boldly as to create a social engineering and phishing campaign to steal…
Job Scam – Social engineering and phishing
September 10, 2020
A novel phishing attack was recently launched against users at Texas State University which has caused problems for some Bobcats. The scam was predicated on a job offer which led to at least one victim having their account hacked, which was then used as a source email address for the scammers to send phishing emails…