This site will highlight a different IS-3-related risk area each year and provide tools and resources to help units with cybersecurity and compliance in that area.
The goal of each annual theme is to provide understandable and actionable tools, guidance, and resources to assist units in improving their security posture and increasing security awareness and compliance. Each theme will focus on:
- A key risk area relating to IS-3,
- The risks and IS-3 requirements the theme helps the unit address, and
- Information and actual tools, such as services or templates, to help units make progress and increase awareness in that area.
Over 2 million laptops are reported stolen yearly in the United States, and thousands are misplaced or lost. UC Berkeley is no exception. One of the best and easiest ways to protect the personal and UC-owned data on your computer is to encrypt it. Encryption makes the data on your computer unreadable in the event it is lost, stolen, or confiscated.
Check out our IS-3 Workstation Encryption Guide to get started!