Skip to main
University-wide Navigation

Cybersecurity is something that we all have a responsibility to contribute to. Whether it's staying informed, using the best tools, or sharing information with colleagues-- we can all take steps to ensure the safety of our University data and systems. This site is meant to provide you with the information you need to be #CyberSafeCats at UK.

Contact the ITS Cybersecurity team at cybersecurity@uky.edu

Training & Best Practices

Explore resources below to learn more about cybersecurity.

WATCH: Personally Identifiable Information (PII)

WATCH: Keeping Your Data Safe While Traveling Abroad

Watch the video below to Cybersecurity tips to be aware of while you are traveling abroad. Whether that is before you leave, while on your trip, or when you get home.

WATCH: Keeping Your Data Safe While Traveling Abroad

Cybersecurity Web Series

Learn more about cybersecurity best practices through real life scenarios.

WATCH: Restricted Intelligence: Web Series

Types of Threats

Other types of threats can be found at www.fbi.gov/investigate/cyber

Phishing

Phishing can be defined as a cybercrime where one may be contacted by someone posing as a legitimate institution or person to encourage individuals to provide sensitive data such as personally identifiable information (PII), financial information, or passwords. This crime can result in identity theft and financial loss.

How To Respond To or Detect a Spam Email or Phishing Attack

How do I report spam and phishing emails?

How can I determine if the email I received is safe?

Want to receive emails about common phishing attacks seen at UK?

Sign up for our Phishing Newsletter

Job Scams

Many scammers try to trick you with messages to apply for jobs. These can often result in identity theft or loss of money. 

More examples:

See our Top 5 Job Scams: Tips to Recognize and Avoid These Career Traps to learn more. 

Malware

Malware, or malicious software, are files or code that are used by attackers to perform malicious behavior on a machine. There are a wide variety of malware attacks which often result in stolen information or money.

How do I find out if my personal computer has a virus?

Cybersecurity Tools Available at UK

Learn more about tools used at UK to protect our University data and systems.

Two-Factor Log-In

Two-Factor Log-In adds an extra-layer of protection to your data and personal information! Visit the Tech Help Center for all related information at Two-Factor Log-In Article Listing.

Advanced Threat Protection

Advanced Threat Protection (ATP) protects the University community against malicious content sent to any University email address and content stored in Microsoft 365 by reducing exploits like direct deposit fraud, W2 theft, and ransomware attacks which can be spread globally. 

What is Advanced Threat Protection?

Office 365 Advanced Threat Protection (ATP) Anti-Phishing Tips

MalwareBytes for Students

MalwareBytes is an anti-virus software available to UK students to use on their personal machines. MalwareBytes can be downloaded at download.uky.edu

Malwarebytes For Student Computers

External Tagging

External tagging immediately flags any emails that are sent from non-UK addresses as "external".

Why External Email Tagging Was Implemented

Cybersecurity News

Mozilla Releases Security Updates for Firefox 110 and Firefox ESR

Original release date: February 14, 2023 Mozilla has released security updates to address vulnerabilities in Firefox 110 and Firefox ESR. An attacker could exploit these vulnerabilities to take control of an affected system.

Microsoft Releases February 2023 Security Updates

Original release date: February 14, 2023 Microsoft has released updates to address multiple vulnerabilities in Microsoft software. An attacker can exploit some of these vulnerabilities to take control of an affected system.

Apple Releases Security Updates for Multiple Products

Original release date: February 14, 2023 Apple has released security updates to address vulnerabilities in multiple products. An attacker could exploit these vulnerabilities to take control of an affected device. CISA encourages users and administrators to review the Apple security updates page for the following products and apply the necessary updates as soon as possible: