Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
517 Results
Secure and Safe Travel and Remote Work
The IT Security Awareness Quiz link is at the article's end. Everyone who completes the quiz is entered to win one of six $50 Amazon gift cards.
Feb 2024: Deepfake Scam Imitating CFO
Threat Alert: Deepfake Scam Targeting Financial Transactions An employee attended a video conference call with seemingly authentic colleagues, all of whom were later revealed to be deepfake representations. The worker, initially suspicious of a phishing email, was convinced by the realistic appearance and voices of the deepfake participants during the video call. Subsequently, the employee authorized a large financial transaction, thinking it was a legitimate request initiated by the CFO.
Operational
Multi-Factor Authentication (Duo)
DescriptionWhat is multi-factor authentication?Phishing and brute force attacks are increasing exponentially, and so are the risks that your credentials may be stolen. Multi-factor authentication (also known as two factor authentication), or MFA, provides added security control to ensure that every login from every device is legitimate.
- Affiliate
- Faculty
- Staff
- Technical Partner
- Access & Identity
Get Global Access with eduroam
Overvieweduroam (education roaming) is the secure worldwide federated network access service developed for the international research and education community.What does it do?For the traveler:
- Affiliate
- Faculty
- Non-UCSF
- Staff
- Student
- Network & Wireless
Operational
Zoom Web Conferencing
DescriptionZoom is a simple, all-in-one solution that lets you meet across desktops, mobile devices and conference rooms. Zoom is free to UCSF faculty, staff and students, and the UCSF Zoom instance is HIPAA-compliant.
- Affiliate
- Faculty
- Staff
- Student
- Volunteer
- Email & Collaboration
Sep 2023: Phishing Lure Uses Potential Employment Status Theme
Threat Alert: Employment Status-Themed Phishing Lures Cybercriminals have launched a series of phishing attacks using concerns over the recipient’s employment status legality as a lure. The lures contain a link purportedly related to employment status documentation. Key Actions (at Work and at Home)
Subscribe to a Listserv
- Faculty
- Staff
- Student
Dec 2022: HIPAA-Related Lures
Threat Alert: What to Watch For Cybercriminals have launched a series of phishing attacks impersonating the legitimate law firm, including Latham & Watkins.
Avoid Spam
Overview Most of us have received unsolicited email at one time or another. Most of the time, we just delete the message and get on with our lives. However, there may be times when some of the content of this email is so offensive or so obviously an illegal scam that we ask ourselves, "How do these people get my address, and what can I do to stop this?" Good question. Let's first examine how spammers may get your address. How do spammers and marketers get my address?
- Technical Partner
- Security
Options for Sharing Sensitive Data with Non-UCSF Collaborators
You cannot share CipherCloud-encrypted files with non-UCSF collaborators. If you need to share restricted data with parties outside UCSF, you can use RAE; onboard your external collaborator as a UCSF affiliate; or use UCSF's Secure Email. Research Ana
- Affiliate
- Faculty
- Staff
- Business Applications