Table organizing top resources provided by ITS Security
security-home-lock.png security-home-policy.png security-home-scams.png
How to Stay Secure
Actions you can take to protect yourself and university resources.
IT Policies
UC systemwide and local IT policies and compliance guidelines. 

Beware of Scams
Identify and take action if you have received or responded to a scam.

security-home-data.png security-home-copyright.png security-home-awareness.png

Know your Data 
University data and IT resources are classified into three categories: Protection, Availability, and Recovery Levels.

Copyright Education
Individual and university responsibilities to comply with copyright law. 
Cybersecurity Awareness
Cyber tips and links to external resources including systemwide initiatives.

Further Reading

Krebs on Security

How Each Pillar of the 1st Amendment is Under Attack

In an address to Congress this month, President Trump claimed he had "brought free speech back to America." But barely…

When Getting Phished Puts You in Mortal Danger

Many successful phishing attacks result in a financial loss or malware infection. But falling for some phishing scams, like those…

Arrests in Tap-to-Pay Scheme Powered by Phishing

Authorities in at least two U.S. states last week independently announced arrests of Chinese nationals accused of perpetrating a novel…