Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
361 Results
Subscribe to a Listserv
- Faculty
- Staff
- Student
Avoid Spam
Overview Most of us have received unsolicited email at one time or another. Most of the time, we just delete the message and get on with our lives. However, there may be times when some of the content of this email is so offensive or so obviously an illegal scam that we ask ourselves, "How do these people get my address, and what can I do to stop this?" Good question. Let's first examine how spammers may get your address. How do spammers and marketers get my address?
- Technical Partner
- Security
Microsoft 365: Word Training
Learn the InterfaceFamiliarize yourself with the Word Online interface. Explore the ribbon tool bar and the Tell Me search box to locate tools and discover how to use the view modes and zoom function.
- Faculty
- Staff
- Student
- Email & Collaboration
Jan 2024: Phishing Attacks Use CAPTCHA to Increase Trust
Threat Alert: Phishing Attacks Use CAPTCHA to Increase Trust Cybercriminals have launched a series of phishing attacks imitating a legitimate company.
Nov 2022: Shopping and Shipping Themed Mobile Attacks Likely to Ramp in Coming Weeks
Holiday-Related Phishing Attacks: What You Need to Know Every year, as the holiday shopping season approaches, holiday-themed phishing attacks rise. Attackers know the season brings a high volume of ecommerce activity—and related notifications.
Options for Sharing Sensitive Data with Non-UCSF Collaborators
You cannot share CipherCloud-encrypted files with non-UCSF collaborators. If you need to share restricted data with parties outside UCSF, you can use RAE; onboard your external collaborator as a UCSF affiliate; or use UCSF's Secure Email. Research Analysis Envi
- Affiliate
- Faculty
- Staff
- Business Applications
Nov 2022: Recruitment Company Michael Page Impersonated in Job-Themed Lures
Threat Alert: What to Watch For Cybercriminals have launched a series of phishing attacks against individuals in the UK impersonating the recruitment company Michael Page.
RAE - Drive Mapping Instructions
Drive Mapping - Windows and Mac InstructionsWindows InstructionsMac InstructionsIt can sometimes be more convenient to map your RAE drive directly to your Windows or Mac device. These instructions will teach you how to do so on both types of devices. A VPN or UCSF network connection is required.Specific share names and paths are supplied in the RAE Welcome letter when signed up.
- Staff
Request a Statement of Responsibility
- Affiliate
- Faculty
- Non-UCSF
- Staff
- Student
- Technical Partner
- Volunteer
Account Login Provisioning
- Technical Partner