Skip to Content
Texas State University

Information Security Office

Incident Reporting

Help protect information resources by reporting exposure, loss, or compromise of university data and systems.

Security Services

Start a software or hardware security evaluation, network vulnerability scan, or request other security services.

Working with the ISO

The Information Security Office strives to ensure that TXST users are able to get answers and resolutions quickly. There are laws, policies, standards and guidelines to consider when evaluating or implementing new services, all of which may impact timelines and security requirements. Take some time to familiarize yourself with how these processes work and what is required of you when requesting services by exploring this section.

Best practices vector image
resources and services image icon

Security Services and Tools

The ISO offers a wide variety of services and security tools to faculty, staff, and students. Discover what we offer and how we can help. Finding what you need is just a click away.

Security Training

If you know you need extra security training because you are a Level 2 Information Resource Employee, or just want to learn how to be more secure, you can find it here. The ISO runs a trimester-based training schedule for all TXST users.
Security training section icon
Cybersecurity Awareness month icon image

Cybersecurity Awareness Month

Every October is National Cybersecurity Awareness Month. Join us for guest speakers, games, and more.

Phishing scams

Find out about the latest phishing on campus, get tips and tricks to avoid scams, and power up your digital critical thinking skills to be harder for the cyber criminals to catch.
phishing section vector image


RT @BleepinComputer: Costco discloses data breach after finding credit card skimmer - @serghei
#CybersecurityAwarenessMonth might be over, but we just posted videos from our events with @_JohnHammond and…

TXST ISO Phishbowl

Expand All Content

March 18, 2021
Most of the time, we think of phishing attacks as something delivered through email, text, or voicemail. And this is true, for the most part, but there are other clever ways attackers can leverage a target’s implicit trust – and that is by using their own forms against them. Form Phishing Attack An attack vector…

November 18, 2020
Cyber criminals are often able to derive identities of victims by aggregating data from different sources. This could be done by collecting lists of known accounts and comparing them with other identifying information, or other more involved surveillance. Rarely do attackers move so boldly as to create a social engineering and phishing campaign ...

September 10, 2020
A novel phishing attack was recently launched against users at Texas State University which has caused problems for some Bobcats. The scam was predicated on a job offer which led to at least one victim having their account hacked, which was then used as a source email address for the scammers to send phishing emails…