Cybersecurity Awareness

Protecting Your Credentials

1. Beware Social Engineering and Phishing Scams

Phishing scams are a significant source of compromised credentials.  These scams are a form of social engineering attacks used to trick the unsuspecting user into revealing account information. These scams can occur by phone, email, or text. 



Phishing is a type of attack carried out to steal usernames, passwords, credit card information, Social Security numbers, and/or other sensitive data. Phishing is most often seen in the form of malicious emails pretending to be from credible sources like people, departments, or organizations related to the university.

Attackers can use this information to:

Settings for Securing Zoom

UC Berkeley Zoom 

UC Berkeley's Zoom service may only be used for P3 (and below) data according to the Berkeley Data Classification Standard and may not be used to transmit or store P4 data including, but not limited to: Social Security numbers, financial account numbers, or export controlled data. Refer to the Data Classification Standard for a comprehensive list of P4 data types.  

Best Practices for Telecommuting Securely

Please note: personally-owned computers used by multiple people in the household are unlikely to meet the Campus Minimum Security for Networked Devices (MSSND) Standard. Risks to consider with home systems include:

  • Multiple users with administrator access allow for download and spread of malware

  • Insecure configurations leave the systems vulnerable to attacks

Cybersecurity Tips & Best Practices

Resources for cybersecurity awareness and best practices on a variety of topics.

Basics for Securing Your Data:


ransomware image

Materials in this toolkit are available to the entire UC Berkeley community. Our items are intended to be quick and easy to use. 

Tips from this toolkit can help to keep you safe from ransomware attacks. 

-Information Security. Made Bearable.

Ransomware Flyers

Broaden your ransomware prevention knowledge

Below are flyers (8.5" x 11") with tips on preventing ransomware.
Click on the image(s) to download the pdf.

Ransomware Videos

Short videos to broaden your ransomware knowledge

Too busy to read our articles? No problem! Here are three, short videos to give you some tools to protect yourself from cyber criminals.