Cybersecurity Awareness

Top 10 Secure Computing Tips

Top Ten Secure Computing Tips"Top 10" List of Secure Computing Tips

Tip #1 - You are a target to hackers

Don't ever say, "It won't happen to me." We are all at risk and the stakes are high - both for your personal and financial well-being  and for the university's standing and reputation. 

Declutter Your Digital Files

It's easy for our digital selves to get cluttered and disorganized. A proper Marie Kondo approach to thinning out old files can keep your devices and information more secure. Plus it can improve the speed and performance of your devices. 

Here are a few things you can do to improve your digital security and online safety:

Data Privacy and You

January 8, 2020

In honor of International Data Privacy Day, January 28

Data Privacy Day Logo

All of us exist in digital form on the Internet. When you're online you leave a trail of "digital exhaust" in the form of cookies, GPS data, social network posts, browser searches, and email exchanges, among others. Services that you don’t even use may have information about you. And once something is online, it can be there forever.

Security Basics: 101

The basics of campus information security boil down to the following three concerns:  Protecting Yourself, Protecting Devices, and Protecting Data

Protecting Yourself

Protect your personal information by following guidelines for managing passwords, learning how to avoid phishing scams, and by remembering secure computing practices at all times.

Best Practices for Telecommuting Securely

Please note: personally-owned computers used by multiple people in the household are unlikely to meet the Campus Minimum Security for Networked Devices (MSSND) Standard. Risks to consider with home systems include:

  • Multiple users with administrator access allow for download and spread of malware

  • Insecure configurations leave the systems vulnerable to attacks

Cybersecurity Tips & Best Practices

Resources for cybersecurity awareness and best practices on a variety of topics.

Cybersecurity Basics:

Settings for Securing Zoom

UC Berkeley Zoom 

UC Berkeley's Zoom service may only be used for P3 (and below) data according to the Berkeley Data Classification Standard and may not be used to transmit or store P4 data including, but not limited to: Social Security numbers, financial account numbers, or export controlled data. Refer to the Data Classification Standard for a comprehensive list of P4 data types.  

Ransomware

Learn how to protect yourself from ransomware with these flyers, tips, and videos.

Department of Homeland Security: Beware Fake Election Websites

August 27, 2020

The FBI has reported an increase in suspicious websites popping up that look like official election websites but are in fact fraudulent. These sites have multiple purposes: