Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
12 Results
Data Loss Prevention (DLP)
- Affiliate
- Faculty
- Non-UCSF
- Staff
- Student
- Technical Partner
- Volunteer
Phish Alarm
What is Phish Alarm?Phish Alarm is a tool that is available to all users at UCSF. With the click of a button, users can report a phishing or malicious message. As described here, the Report Phish button is available for both PC and Mac Outlook clients as well as on Outlook Web Access (email.ucsf.edu) and the Outlook Mobile App.
- Faculty
- Staff
- Student
- Security
Proofpoint URL Isolation
- Affiliate
- Faculty
- Staff
- Student
- Volunteer
Security Incident Response & Investigation
- Technical Partner
MyAccess Single Sign-on Integration
- Affiliate
- Faculty
- Staff
- Technical Partner
Imprivata OneSign
- Affiliate
- Faculty
- Staff
- Technical Partner
Account Login & Password
DescriptionActive Directory (AD) is a Microsoft-based technology that provides a variety of network services, including:Lightweight Directory Access Protocol (LDAP)Kerberos-based authenticationDNS-based namingA central location for network administration and delegation of authorityUsing Active DirectoryYour UCSF AD account provides access to many systems:
- Affiliate
- Faculty
- Staff
- Student
- Technical Partner
- Volunteer
- Access & Identity
IT Security Risk Assessment
Overview UCSF is required by a number of policies, laws, and regulations to assess the security risk of information systems that handle UCSF data. What is an IT security risk assessment at UCSF? The IT security risk assessment process collects information about each of our information systems and scores their security compliance. The process measures the security aspects of all computing devices associated with the system including servers, desktop computers and laptops, mobile devices, network hardware, and other related technologies.
- Faculty
- Staff
- Technical Partner
- Security
Degraded Performance
Multi-Factor Authentication (Duo)
DescriptionWhat is multi-factor authentication?Phishing and brute force attacks are increasing exponentially, and so are the risks that your credentials may be stolen. Multi-factor authentication (also known as two factor authentication), or MFA, provides added security control to ensure that every login from every device is legitimate.
- Affiliate
- Faculty
- Staff
- Technical Partner
- Access & Identity
Operational
REDCap
Description Research Electronic Data Capture (REDCap) is a secure and HIPAA-compliant web-based system for building and managing web-based research projects, such as surveys and databases. The REDCap system provides functionality and features to enable researchers to rapidly develop databases and online surveys. These databases, data entry forms and surveys are intuitive, easy-to-use tools for collecting data, including data validation.
- Affiliate
- Faculty
- Staff
- Student
- Research Services