Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
505 Results
IS-3 Project - Remote Access Controls
- Affiliate
- Faculty
- Staff
- Technical Partner
UCSF IT Security Awareness News You Can Use - Archive
The UCSF IT Security Awareness News You Can Use Newsletter includes monthly articles, contests, and upcoming events. Learn about new threats and how to protect UCSF and yourself from data breaches. You can also participate in contests to win prizes! June 2024Follow UC and UCSF Policies| Multi-factor (Duo) fatigue flyer Contest | New resource section on the "Real Phishing Scams page" | See the red flags from the recent UCSF-wide mock phish
Zoom Cloud Recording
- Affiliate
- Faculty
- Staff
- Student
- Technical Partner
- Volunteer
Resolve Accidental Uploads from Macs to iCloud
- Affiliate
- Faculty
- Staff
- Student
- Technical Partner
- Volunteer
How to use the Configuration Management Database (CMDB)
- Affiliate
- Faculty
- Non-UCSF
- Staff
- Student
- Technical Partner
- Volunteer
UCSF Adobe Licensing
UCSF has a discounted licensing agreement with Adobe for Devices used for UCSF Business and UCSF-owned devices. UCSF does not have a site license agreement for any Adobe products.For students, devices not used for UCSF business and not owned by UCSF will need to purchase licenses directly from Adobe. For Students: Adobe Creative Cloud for students and teachers | Adobe Creative Cloud
Microsoft 365 FAQs
We continue to update these FAQs. If your question isn't answered here, please contact the IT Service Desk at help.ucsf.edu, or ask your colleagues on the Office 365 Team.
- Faculty
- Staff
- Student
- Email & Collaboration
Guideline
UCSF IT Security Cloud Computing Guidance - Cloud Service Basics
Overview | What is the "cloud"? The "cloud" is a continually evolving concept that broadly references cloud services, or cloud computing. Cloud services can mean collections of any or all of the following: applications, information, infrastructure components and services provided as pools of resources. The ability for these broadly accessible services to be rapidly provisioned, deprovisioned, expanded and contracted based on demand creates a demand-driven service model, which can be seen as a "Pay for what you use" type of IT service.
Impacted Services: IT Security Outreach and Training
IT Portfolio | Intake Queue
This intake queue list is updated on the first Tuesday of the month.
Please email immediate questions to [email protected].
Please visit Our Process to learn about our intake process.
DDPE Frequently Asked Questions (FAQs)
FAQs What is encryption? Encryption is a process in which data is “scrambled” using an encryption key. This makes the data unreadable and inaccessible to unauthorized users. How is DDPE or DEE different from current encryption solutions?