Table organizing top resources provided by ITS Security
security-home-lock.png security-home-policy.png security-home-scams.png
How to Stay Secure
Actions you can take to protect yourself and university resources.
IT Policies
UC systemwide and local IT policies and compliance guidelines. 

Beware of Scams
Identify and take action if you have received or responded to a scam.

security-home-data.png security-home-copyright.png security-home-awareness.png

Know your Data 
University data and IT resources are classified into three categories: Protection, Availability, and Recovery Levels.

Copyright Education
Individual and university responsibilities to comply with copyright law. 
Cybersecurity Awareness
Cyber tips and links to external resources including systemwide initiatives.

Further Reading

Krebs on Security

How Phished Data Turns into Apple & Google Wallets

Carding -- the underground business of stealing, selling and swiping stolen payment card data -- has long been the dominion…

Nearly a Year Later, Mozilla is Still Promoting OneRep

In mid-March 2024, KrebsOnSecurity revealed that the founder of the personal data removal service Onerep also founded dozens of people-search…

Microsoft Patch Tuesday, February 2025 Edition

Microsoft today issued security updates to fix at least 56 vulnerabilities in its Windows operating systems and supported software, including…