Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
61 Results
Standard Process for Confirmed Phishing Link Clicks
- Faculty
- Staff
- Student
- Volunteer
Dell Encryption Enterprise for Macs Discontinued By Dell
- Affiliate
- Faculty
- Staff
- Student
- Technical Partner
- Volunteer
How to use the Configuration Management Database (CMDB)
- Affiliate
- Faculty
- Non-UCSF
- Staff
- Student
- Technical Partner
- Volunteer
COVID-19 Cyber Scams
Be on the lookout for COVID-19-themed phishing messages. Cyber actors are mimicking the organizations providing COVID-19 health guidance, financial relief and stimulus, and charities including the CDC, WHO, and the US Treasury.
- Faculty
- Staff
- Student
- Security
Avoid Spam
Most of us have received unsolicited email at one time or another. Most of the time, we just delete the message and get on with our lives. However, there may be times when some of the content of this email is so offensive or so obviously an illegal scam that we ask ourselves, "How do these people get my address, and what can I do to stop this?" Good question. Let's first examine how spammers may get your address. How do spammers and marketers get my address?
- Technical Partner
- Security
Protect UCSF and Myself from Phishing and Other Similar Scams
See the Red Flags from The latest UCSF Phishing Campaign WHAT YOU SHOULD DO IF YOU RECEIVE A RANDOM EMAIL OR CALL THAT ASKS FOR YOUR PRIVATE INFORMATION:
- Technical Partner
- Security
IT Security Awareness - Stay Sharp to Stay Safe
Welcome to the IT Security Awareness site! Each month, we focus on a new IT security topic of interest to the UCSF community. Taking the current month's quiz at the end of the article enters you into a drawing for one of six $50 Amazon Gift Cards.
- Technical Partner
- Security
Encryption Variance Form for Individuals
- Faculty
- Staff
- Student
- Technical Partner
Activate Removable Storage Encryption
- Faculty
- Staff
- Student
- Technical Partner
Bring Your Own Device (BYOD) to UCSF
You can use your own smartphone, tablet, laptop or computer to access UCSF systems, but the device needs to comply with UCSF's security policy. This is to ensure that your device, the UCSF network and UCSF sensitive data all remain safe.The UCSF IT Service Desk is available 24 hours a day, 7 days a week. Contact us:
- Affiliate
- Faculty
- Non-UCSF
- Staff
- Student
- Technical Partner
- Volunteer
- Security