Table organizing top resources provided by ITS Security
security-home-lock.png security-home-policy.png security-home-scams.png
How to Stay Secure
Actions you can take to protect yourself and university resources.
IT Policies
UC systemwide and local IT policies and compliance guidelines. 

Beware of Scams
Identify and take action if you have received or responded to a scam.

security-home-data.png security-home-copyright.png security-home-awareness.png

Know your Data 
University data and IT resources are classified into three categories: Protection, Availability, and Recovery Levels.

Copyright Education
Individual and university responsibilities to comply with copyright law. 
Cybersecurity Awareness
Cyber tips and links to external resources including systemwide initiatives.

Further Reading

Krebs on Security

Patch Tuesday, April 2025 Edition

Microsoft today released updates to plug at least 121 security holes in its Windows operating systems and software, including one…

Cyber Forensic Expert in 2,000+ Cases Faces FBI Probe

A Minnesota cybersecurity and computer forensics expert whose testimony has featured in thousands of courtroom trials over the past 30…

How Each Pillar of the 1st Amendment is Under Attack

In an address to Congress this month, President Trump claimed he had "brought free speech back to America." But barely…