Cybersecurity Awareness


Ransomware is a type of malicious software designed to block access to a computer system or data until a ransom is paid. 

Learn how to protect yourself and how to report suspicious communications containing ransomware.

Settings for Preventing Zoom-Bombing

What is Zoom-bombing?

Zoom-bombing is the term for when individuals "gate-crash" Zoom meetings. These uninvited guests share their screens to bombard real attendees with disturbing pornographic and/or violent imagery. Most of these are perpetrated via publicly available Zoom links; however, not all depending on your settings. Here are ways to protect you and your guests from falling victim.

Scammers are Exploiting Coronavirus Fears to Phish Users

March 9, 2020
Attackers have been sending emails that feed on concerns about COVID-19 to spread malware, trick them into sharing account credentials, or opening malicious attachments.

Best Practices for Telecommuting Securely

Please note: personally-owned computers used by multiple people in the household are unlikely to meet the Campus Minimum Security For Networked Devices (MSSND) Standard. Risks to consider with home systems include:

  • Multiple users with administrator access allow for download and spreading of malware

  • Insecure configurations leaving the systems vulnerable to attacks



Phishing is a type of attack carried out to steal usernames, passwords, credit card information, Social Security Numbers, and other sensitive data. Phishing is most often seen in the form of malicious emails pretending to be from credible sources such as UC Berkeley technology departments or organizations related to the university.

Attackers can use this information to:

Cybersecurity Tips & Best Practices

Resources for cybersecurity awareness and best practices on a variety of topics.

Basics for Securing Your Data:

Browser Extensions: How to Vet and Install Safely

What is an extension?

A browser extension is essentially a plugin for your browser that performs a function or adds a feature to it. Since extensions are given special authorizations within the browser, they are attractive targets for attackers. 

How to use extensions safely

What is your role in protecting Berkeley Campus Data?

Have you ever copied a work file to your USB drive at the end of the day and wondered, "Is it safe to copy this data Classification Level Pyramidhere?" Have you ever sent an email with a Social Security Number, a credit card number or student grades and wondered "Should I send this in email?"

Security Basics: 101

The basics of campus information security boil down to the following three concerns:  Protecting Yourself, Protecting Devices, and Protecting Data

Protecting Yourself

Protect your personal information by following guidelines for managing passwords, learning how to avoid phishing scams, and by remembering secure computing practices at all times.