Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
379 Results
ProofPoint Quarantine FAQs
- Affiliate
- Faculty
- Staff
- Student
- Technical Partner
- Volunteer
Avoiding Spam
- Affiliate
- Faculty
- Staff
- Student
- Technical Partner
- Volunteer
IT Security Risk Assessment
Overview UCSF is required by a number of policies, laws, and regulations to assess the security risk of information systems that handle UCSF data. What is an IT security risk assessment at UCSF? The IT security risk assessment process collects information about each of our information systems and scores their security compliance. The process measures the security aspects of all computing devices associated with the system including servers, desktop computers and laptops, mobile devices, network hardware, and other related technologies.
- Faculty
- Staff
- Technical Partner
- Security
RAE - Drive Mapping Instructions
Drive Mapping - Windows and Mac InstructionsWindows InstructionsMac InstructionsIt can sometimes be more convenient to map your RAE drive directly to your Windows or Mac device. These instructions will teach you how to do so on both types of devices. A VPN or UCSF network connection is required.Specific share names and paths are supplied in the RAE Welcome letter when signed up.
- Staff
Operational
Multi-Factor Authentication (Duo)
DescriptionWhat is multi-factor authentication?Phishing and brute force attacks are increasing exponentially, and so are the risks that your credentials may be stolen. Multi-factor authentication (also known as two factor authentication), or MFA, provides added security control to ensure that every login from every device is legitimate.
- Affiliate
- Faculty
- Staff
- Technical Partner
- Access & Identity
Get Global Access with eduroam
Overvieweduroam (education roaming) is the secure worldwide federated network access service developed for the international research and education community.What does it do?For the traveler:
- Affiliate
- Faculty
- Non-UCSF
- Staff
- Student
- Network & Wireless
Subscribe to a Listserv
- Faculty
- Staff
- Student
Avoid Spam
Overview Most of us have received unsolicited email at one time or another. Most of the time, we just delete the message and get on with our lives. However, there may be times when some of the content of this email is so offensive or so obviously an illegal scam that we ask ourselves, "How do these people get my address, and what can I do to stop this?" Good question. Let's first examine how spammers may get your address. How do spammers and marketers get my address?
- Technical Partner
- Security
Options for Sharing Sensitive Data with Non-UCSF Collaborators
You cannot share CipherCloud-encrypted files with non-UCSF collaborators. If you need to share restricted data with parties outside UCSF, you can use RAE; onboard your external collaborator as a UCSF affiliate; or use UCSF's Secure Email. Research Analysis Envi
- Affiliate
- Faculty
- Staff
- Business Applications
Request a Statement of Responsibility
- Affiliate
- Faculty
- Non-UCSF
- Staff
- Student
- Technical Partner
- Volunteer