• Skip to primary navigation
  • Skip to main content

Texas A&M System IT

The Texas A&M University System

  • Services
    • AggieBuy
    • Concur
    • Contracts
    • Earning Codes
    • Enterprise Data Warehouse
    • FAMIS
    • Maestro
    • Position Budget
    • Security Operations Center
    • Single Sign-On
    • Time and Effort
    • TrainTraq
    • TRS
    • UIN Manager
    • Workday Services
  • Collaboration
    • Project Management
    • Organizational Change Management
    • The Texas A&M University System Technology Summit
  • Projects
    • HCM Academic Management Discovery
    • Financial Systems Modernization
  • Cybersecurity
    • News and Alerts
    • Be Cyber Savvy
    • Standards and Procedures
    • Report an Incident
    • Security Operations Center
    • Information Security Council
  • Governance & TACs
    • IT Governance Framework
    • Accessibility
    • Project Management
  • Contact
  • About
    • Members
    • CIO Blog
    • Communications
      • Guidelines
      • Logos, Color Palette and Templates
      • Writing Style
      • Web Requirements
      • Email and Email Signature
      • Statewide Cybersecurity Services Style Guide
  • Search

Cybersecurity

Cybersecurity at the A&M System is an individual and collective effort of our members. It is necessary for us to work together, sharing resources and information assets.

You are here: Home / Cybersecurity / Tips for Protecting Yourself and Your Information

Tips for Protecting Yourself and Your Information

Cybersecurity is a shared responsibility and it is vitally important to be mindful we are all targets and that no one is “under the radar”. The Texas A&M University System encourages you to STOP.THINK.CONNECT.

Report an Incident

Ideas for you to stay safe and to protect yourself online:

Make sure your computer has security software and that it’s up-to-date
In most cases, your operating system (usually Microsoft Windows or Apple OS X) will have its own security software. MAKE SURE IT IS ENABLED AND UP TO DATE. The bad guys love to take advantage of old security software.

Don’t download unfamiliar software off the Internet
Many downloads that seem great – music services, editing programs, even security software are BAD FOR YOUR COMPUTER AND BAD FOR YOUR CREDIT CARD!

Beware of clicking on random links!
Usually, your security software will protect you against harmful links, BUT NOT ALWAYS. ONLY CLICK ON LINKS YOU’RE SURE ABOUT. If it looks like a strange link that doesn’t go with the subject of the e-mail or with the text on the page, don’t click on it.

Change your password frequently and NEVER share passwords
Your friends won’t treat it as carefully as you would. IF YOU DO GIVE OUT YOUR PASSWORD, MAKE SURE YOU CHANGE IT AFTERWARDS.  WE NEVER RECOMMEND SHARING PASSWORDS.

Always log off or restart when you’ve finished
Leaving your computer on and connected to the Internet is like leaving your door unlocked. NEVER LEAVE A COMPUTER RUNNING WHEN YOU’RE FINISHED! ALWAYS LOG OFF! Re-starting allows your security system to install crucial updates to guard against the latest viruses, spyware and malware.

Backup your data
Don’t just back up your data and documents occasionally. The best way to back up data is on a separate drive or in the cloud. That way, if your hard drive crashes–and you should assume that one day it probably will—YOU WON’T LOSE EVERYTHING YOU’VE WORKED FOR.

If you have any questions regarding security or see something suspicious, contact your local Information Security Officer.

Resources for online security and awareness

Copyright © 2022 Texas A&M University System All rights reserved.

301 Tarrow Street, College Station, TX 77840 | MAP | Phone: (979) 458-7700 | email: tamus-webmaster@tamus.edu
State of Texas |  Texas Homeland Security |  Texas Veterans Portal |  Statewide Search |  Risk, Fraud & Misconduct Hotline |  Privacy |  Web Accessibility |  State Link Policy |  Campus Carry

Texas A&M University System
Security Operations Center Governance Board

Purpose

Provides cybersecurity services to enhance the IT security position of A&M System members

 

Responsibilities

Provide financial oversight, guiding principles and strategic direction for the A&M System shared service implementation of the Security Operations Center

 

Members

Chair: SOC Board Member (rotates)
Vice Chair: SOC Board Member (rotates)
Secretary: SOC Board Member (rotates)

11 Representatives nominated and elected by the Information Security Council, consisting of:
– Two University Chief Information Officers
– One Agency Chief Information Officer
– Two University Information Security Officers
– One Agency Information Security Officer
– Five Member Cybersecurity Functional Professionals (IT Manager, Network / Security / System Administrator, Analyst, Engineer, etc.)

 

 

Upcoming Meetings

2021

  • November 4

2022

  • February 28