Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
91 Results
Everbridge
- Affiliate
- Faculty
- Staff
- Student
- Volunteer
IT Security Risk Assessment
Overview UCSF is required by a number of policies, laws, and regulations to assess the security risk of information systems that handle UCSF data. What is an IT security risk assessment at UCSF? The IT security risk assessment process collects information about each of our information systems and scores their security compliance. The process measures the security aspects of all computing devices associated with the system including servers, desktop computers and laptops, mobile devices, network hardware, and other related technologies.
- Faculty
- Staff
- Technical Partner
- Security
Avoid Spam
Overview Most of us have received unsolicited email at one time or another. Most of the time, we just delete the message and get on with our lives. However, there may be times when some of the content of this email is so offensive or so obviously an illegal scam that we ask ourselves, "How do these people get my address, and what can I do to stop this?" Good question. Let's first examine how spammers may get your address. How do spammers and marketers get my address?
- Technical Partner
- Security
Options for Sharing Sensitive Data with Non-UCSF Collaborators
You cannot share CipherCloud-encrypted files with non-UCSF collaborators. If you need to share restricted data with parties outside UCSF, you can use RAE; onboard your external collaborator as a UCSF affiliate; or use UCSF's Secure Email. Research Analysis Envi
- Affiliate
- Faculty
- Staff
- Business Applications
COVID-19 Cyber Scams
Be on the lookout for COVID-19-themed phishing messages. Cyber actors are mimicking the organizations providing COVID-19 health guidance, financial relief and stimulus, and charities including the CDC, WHO, and the US Treasury.
- Faculty
- Staff
- Student
- Security
Manage Recipients' Action Levels
What you need to know about each action Recipient Action Description Action required for routing to move forward?
Cisco Jabber UC Training: Login
Logging into Cisco Jabber UC Type in your email username (FirstInitialLastname or LastnameFirstInitial), e.g., [email protected], and then type in your email password before clicking the Sign In button. NOTE: If you sign out from Jabber client after a successful login, it remembers your username in its cache. The next time you sign in, you should only need to enter your email password.
- Faculty
- Staff
- Student
- Phones & Pager
Avoid Being Phished - Quick Tips
How can I avoid phishing attacks? Phishing messages are becoming more targeted, sophisticated and even harder to recognize. Look for signs of phishing These include emails with suspicious links or attachments, plus:
UCSF Adobe Acrobat Pro
ServiceNow Account Request
- Faculty
- Staff
- Technical Partner