![]() |
![]() |
![]() |
How to Stay Secure Actions you can take to protect yourself and university resources. |
IT Policies UC systemwide and local IT policies and compliance guidelines. |
Beware of Scams |
![]() |
![]() |
![]() |
Know your Data |
Copyright Education Individual and university responsibilities to comply with copyright law. |
Cybersecurity Awareness Cyber tips and links to external resources including systemwide initiatives. |
Further Reading
Krebs on Security
How Each Pillar of the 1st Amendment is Under Attack
In an address to Congress this month, President Trump claimed he had "brought free speech back to America." But barely…
When Getting Phished Puts You in Mortal Danger
Many successful phishing attacks result in a financial loss or malware infection. But falling for some phishing scams, like those…
Arrests in Tap-to-Pay Scheme Powered by Phishing
Authorities in at least two U.S. states last week independently announced arrests of Chinese nationals accused of perpetrating a novel…