Information Security Office

Incident Reporting

Help protect information resources by reporting exposure, loss, or compromise of university data and systems.

Security Services

Start a software or hardware security assessment, network vulnerability scan, or request other security services.

Law - Policies - Guidelines

The Information Security Office strives to ensure that TXST users are able to get answers and resolutions quickly. There are laws, policies, standards and guidelines to consider when evaluating or implementing new services, all of which may impact timelines and security requirements. Take some time to familiarize yourself with how these processes work and what is required of you when requesting service procurements.

Best practices vector image
Cybersecurity Awareness month icon image

Cybersecurity Awareness Month

Every October is National Cybersecurity Awareness Month. Join us for guest speakers, games, and more. This year, we are joined by special guest speaker, H.D. Moore, founder of the Metasploit Project.

Security Training

If you know you need extra security training because you are a Level 2 Information Resource Employee, or just want to learn how to be more secure, you can find it here. The ISO runs a trimester-based training schedule for all TXST users.
Security training section icon
resources and services image icon

All Services and Tools

The ISO offers a wide variety of services and security tools to faculty, staff, and students. Discover what we offer and how we can help. Finding what you need is just a click away.

Phishing Awareness

Find out about the latest phishing on campus, get tips and tricks to avoid scams, and power up your digital critical thinking skills to be harder for the cyber criminals to catch.
phishing section vector image

Information Security Glossary

The information security glossary is a searchable and filterable glossary of terms and definitions we use in all aspects of our work. Familiarize yourself with this terminology to deepen your understanding of information security at Texas State University.

TXST ISO Phishbowl

Expand All Content

Aggressive Phishing Attacks via Forms

March 18, 2021
Most of the time, we think of phishing attacks as something delivered through email, text, or voicemail. And this is true, for the most part, but there are other clever ways attackers can leverage a target’s implicit trust – and that is by using their own forms against them. Form Phishing Attack An attack vector…

Identity Theft and Social Engineering

November 18, 2020
Cyber criminals are often able to derive identities of victims by aggregating data from different sources. This could be done by collecting lists of known accounts and comparing them with other identifying information, or other more involved surveillance. Rarely do attackers move so boldly as to create a social engineering and phishing campaign to steal…

Job Scam – Social engineering and phishing

September 10, 2020
A novel phishing attack was recently launched against users at Texas State University which has caused problems for some Bobcats. The scam was predicated on a job offer which led to at least one victim having their account hacked, which was then used as a source email address for the scammers to send phishing emails…