Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
158 Results
Mar 2023: Attacks Use Silicon Valley Bank-Related Lures
Threat Alert: What to Watch For Following the collapse of Silicon Valley Bank (SVB), cybercriminals have launched phishing attacks to take advantage of the high-profile event. One widespread lure impersonates Circle, the peer-to-peer payments company that manages the cryptocurrency USDC. The lure encourages recipients to click an offer link to redeem a one-to-one exchange between the cryptocurrency USDC and the U.S.
Everbridge
- Affiliate
- Faculty
- Staff
- Student
- Volunteer
Apr 2023: Okta-Themed Lures Harvest Microsoft Credentials
Threat Alert: What to Watch For Cybercriminals have launched Okta-branded phishing attacks encouraging recipients to follow a link to resynchronize their Okta and Microsoft accounts. Clicking on the link leads to a credential phishing kit that redirects the user to a lookalike Microsoft login page.
Mar 2023: Global Phishing Campaigns Using Tax Season Lures
Threat Alert: What to Watch For Cybercriminals have launched numerous, different phishing attacks using timely tax-themed lures. As multiple attacks are leveraging this topic, the lures will appear different.
Sep 2023: Phishing Lure Uses Potential Employment Status Theme
Threat Alert: Employment Status-Themed Phishing Lures Cybercriminals have launched a series of phishing attacks using concerns over the recipient’s employment status legality as a lure. The lures contain a link purportedly related to employment status documentation. Key Actions (at Work and at Home)
Server Management & Monitoring
- Affiliate
- Faculty
- Staff
- Student
- Volunteer
Account Login & Password
DescriptionActive Directory (AD) is a Microsoft-based technology that provides a variety of network services, including:Lightweight Directory Access Protocol (LDAP)Kerberos-based authenticationDNS-based namingA central location for network administration and delegation of authorityUsing Active DirectoryYour UCSF AD account provides access to many systems:
- Affiliate
- Faculty
- Staff
- Student
- Technical Partner
- Volunteer
- Access & Identity
IT Finance
The IT Finance and Campus Finance teams are responsible for the stewardship of IT’s financial resources (~$300M in annual spend and ~900 FTE). We ensure both IT’s and the institution's fiscal goals are met in compliance with accounting, regulatory, and other policies.
IT Security Risk Assessment
Overview UCSF is required by a number of policies, laws, and regulations to assess the security risk of information systems that handle UCSF data. What is an IT security risk assessment at UCSF? The IT security risk assessment process collects information about each of our information systems and scores their security compliance. The process measures the security aspects of all computing devices associated with the system including servers, desktop computers and laptops, mobile devices, network hardware, and other related technologies.
- Faculty
- Staff
- Technical Partner
- Security
Dec 2022: HIPAA-Related Lures
Threat Alert: What to Watch For Cybercriminals have launched a series of phishing attacks impersonating the legitimate law firm, including Latham & Watkins.