UTHSC team, you may ask yourself why the Chief Information Security Officer is addressing email signatures. It is actually a simple and effective tool that aids in detection of phishing attacks. When all members of an organization follow the format of applying their email signature line consistently across the enterprise, then it serves as a quick visual check that an email may or may not be legitimate.
Although it is easily duplicated by a nefarious actor; any deviation to the standard email signature format can serve as one more red flag that the email you received is a phishing attack.
UTHSC does require a standardized email signature line. You can find a tool HERE (NETID & Password required) which formats this required email signature for you. For more tips on how to spot phishing emails, and how to report and respond to them, and other cybersecurity tips visit the Office of Cybersecurity webpage HERE.
Feel free to reach out to the team and I anytime, or for any of your cybersecurity questions, requirements, or concerns at itsecurity@uthsc.edu or 901.448.1880.