Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
33 Results
Operational
Multi-Factor Authentication (Duo)
DescriptionWhat is multi-factor authentication?Phishing and brute force attacks are increasing exponentially, and so are the risks that your credentials may be stolen. Multi-factor authentication (also known as two factor authentication), or MFA, provides added security control to ensure that every login from every device is legitimate.
- Affiliate
- Faculty
- Staff
- Technical Partner
- Access & Identity
Avoid Spam
Overview Most of us have received unsolicited email at one time or another. Most of the time, we just delete the message and get on with our lives. However, there may be times when some of the content of this email is so offensive or so obviously an illegal scam that we ask ourselves, "How do these people get my address, and what can I do to stop this?" Good question. Let's first examine how spammers may get your address. How do spammers and marketers get my address?
- Technical Partner
- Security
COVID-19 Cyber Scams
Be on the lookout for COVID-19-themed phishing messages. Cyber actors are mimicking the organizations providing COVID-19 health guidance, financial relief and stimulus, and charities including the CDC, WHO, and the US Treasury.
- Faculty
- Staff
- Student
- Security
Avoid Being Phished - Quick Tips
How can I avoid phishing attacks? Phishing messages are becoming more targeted, sophisticated and even harder to recognize. Look for signs of phishing These include emails with suspicious links or attachments, plus:
Protect UCSF and Myself from Phishing and Other Similar Scams
See the Red Flags from The latest UCSF Phishing Campaign Information you need to knowWHAT YOU SHOULD DO IF YOU RECEIVE A RANDOM EMAIL OR CALL THAT ASKS FOR YOUR PRIVATE INFORMATION:
- Technical Partner
- Security
Bring Your Own Device (BYOD) to UCSF
Introduction to BYOD at UCSF You can use your own smartphone, tablet, laptop or computer to access UCSF systems, but the device needs to comply with UCSF's security policy. This is to ensure that your device, the UCSF network and UCSF sensitive data all remain safe. Get Technology Help The UCSF IT Service Desk is available 24 hours a day, 7 days a week. Contact us:
- Affiliate
- Faculty
- Non-UCSF
- Staff
- Student
- Technical Partner
- Volunteer
- Security
Account Request Form (Campus, SOM, ZSFG/SFGH) - How to Approve requests
- Faculty
- Staff
- Technical Partner
Device Encryption
What is encryption? Why do I need it? Encryption is the process of encoding information so that only authorized persons can read it. It is used to protect confidential and legally protected data. In this case, "legally protected" has real and serious meaning. If an unencrypted laptop, tablet, mobile phone or other device is lost or stolen, and if it contained legally protected information, you or the University might be held liable for damages, you could be sent to prison, or the University could take corrective action against you.
- Affiliate
- Faculty
- Staff
- Student
- Technical Partner
- Volunteer
- Security
Manage Your UCSF Password
How to AccessEveryone accessing UCSF resources will have a password for their computers, email and access to email and Office 365 applications on their mobile devices. NOTE: To access your email on your mobile device, you will need to Enroll Your Mobile Device in Intune Company Portal.
- Affiliate
- Faculty
- Staff
- Student
- Technical Partner
- Volunteer
- Access & Identity
Standard Process for Confirmed Phishing Link Clicks
- Faculty
- Staff
- Student
- Volunteer