Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
23 Results
Avoid Spam
Overview Most of us have received unsolicited email at one time or another. Most of the time, we just delete the message and get on with our lives. However, there may be times when some of the content of this email is so offensive or so obviously an illegal scam that we ask ourselves, "How do these people get my address, and what can I do to stop this?" Good question. Let's first examine how spammers may get your address. How do spammers and marketers get my address?
- Technical Partner
- Security
How Do I Protect My Computer from Ransomware
If you receive a ransomware pop-up or message on your device alerting you to an infection: Take immediate action to avoid any additional infections or data loss:
Use Security Tools to Protect All of Your Devices
The link to the quiz is at the end of the article.
Where in the World Are My Report Phish and Staffbase Add-ins?
Recently, Microsoft Outlook Web Access (OWA) changed the location of add-ins you may be accustomed to using. This includes the Phish Alarm and Staffbase buttons.
Fraudulent Chime, Go2Bank, and Acorns Accounts
Information about Chime/Go2Bank/Acorns solicitations for new bank accountsWhat we know about the solicitationsUC recently learned that names, Socia
Ransomware Rising Again!
The link to the IT Security Awareness Quiz is at the end of the article. Complete the quiz for an entry in a drawing for 1 of 6 $50 Amazon gift cards.
See Something Phishy or Strange? Use Phish Alarm to Report Potential Phish and Contact the IT Service Desk or UCSF Police for Other Security Incidents
IT security incidents can originate almost anywhere in an organization due to the myriad of methods used by criminals to steal and disrupt UC Institutional Information and other IT Resources.
Stay Secure with IT Security Tools
Did you know that you can use the UCSF’s security software for your personal or non-centrally supported
Ransomware Running Riot!
The link to the IT Security Awareness Quiz is at the end of the article. Complete it for an entry in a drawing for 1 of 6 $50 Amazon gift cards.
See Something, Say Something: You are the First Line of Defense
IT security incidents can originate almost anywhere in an organization due to the myriad of methods used by criminals to steal and disrupt UC Institutional Information and other IT Resources.