“Report Phish” button is now available
The “Report Phish” button is now available for both PC and Mac Outlook clients as well as Outlook Web Access.
Work from Home Securely
Even before local shelter in place orders, a large part of our community began working from home in early March. Recent estimates suggest that 70% of UCSF employees are currently working remotely. UCSF IT has provided myriad information on how to do so safely and securely.
Avoid Being Phished - Quick Tips
How can I avoid phishing attacks? Phishing messages are becoming more targeted, sophisticated and even harder to recognize. Look for signs of phishing These include emails with suspicious links or attachments, plus:
UCSF 650-16 Addendum A - UCSF Roles and Responsibilities for Securing Institutional Information and IT Resources
Role Responsibilities Notes
Impacted Services: IT Security Outreach and Training
Password Management Tool Enrollment & Login
The Password Management Tool provides users with the ability to complete the following processes: NOTE: Please be sure to follow ALL of the instructions for these processes to avoid a lockout to your UCSF account.
- Technical Partner
- Email & Collaboration
Technology Introduction for Students
Welcome to UCSF! Technology will be an integral component of your UCSF education. These how to page will help familiarize you with technology at UCSF and provides guidance on preparing your computer prior to starting your program. You will find information on the technology resources that are available to you, where to get support, how to setup devices, and information about email and accounts.
- Education Applications
Recommended Security Products
Data is increasingly becoming UCSF’s lifeblood and most critical asset. We’ve curated a collection of tools and products to help you protect UCSF’s data These tools and products have been vetted by IT Security, and we encourage you to use them.
- Technical Partner
Explaining Impact Tiers
The Impact Tier of IT Services is based upon the recovery time objective (RTO), which is the maximum tolerable length of time that a computer, system, or application can be down before major impacts occur. 1 - Most Critical RTO: Up to 15 minutes Core technology infrastructure that requires multiple data centers to be able to serve production without manual intervention. 2 - Critical RTO: Up to 6 hours