Cybersecurity Awareness

Securing Home Wi-Fi

Find your router’s web page

Here are instructions on how to find your router’s IP address. Once you have the IP address (e.g., 192.128.1.1) type it into an address bar (aka URL bar).

...

Security Reminders as We Approach Tax Season

General reminders and best practices: File electronically and use direct deposit for the quickest refunds. File early - the earlier, the better. Filing early helps prevent identity fraud; others cannot file a fake return in your name if you have already filed. Remember that the IRS will never request payment over the phone, or ask for personal information through emails or text messages

Data Privacy Week 2022

January 24 - 28th is Data Privacy Week

Data Privacy Week is an annual campaign to spread awareness about data privacy and educate individuals on how to secure their personal information. It also works to encourage businesses to respect privacy and be more transparent about how they collect, store and use data.

This year, Data Privacy Week 2022, spotlights the value of information and how to “Keep It Private”. Get started with NCA’s ...

Data Privacy Day 2020

Manage Your Privacy Settings: 1. Secure all devices, especially smartphones.

Smartphones are carried by virtually everyone and often they contain our most personal information. Whether iPhone or Android, research the best way to secure it for full privacy including options such as remote wipe.

2. Use a unique password for each site.

That way, if one of your passwords gets compromised, the others are still safe. Use complex passwords and never share them. Using multi-factor authentication (MFA) wherever possible will help protect you even more. Keep your university and personal...

Data Privacy Week Posters

Own Your Privacy

Learn how to review privacy settings for Google Calendar (bCal), Google Groups (bConnected Lists), and Google Drive (bDrive).

Click on the image(s) to download the pdfs.

Database Hardening Best Practices

This checklist was developed by IST system administrators to provide guidance for securing databases storing sensitive or protected data. Implementing these security controls will help to prevent data loss, leakage, or unauthorized access to your databases.

Physical Database Server Security The physical machine hosting a database is housed in a secured, locked and monitored environment to prevent unauthorized entry, access or theft. Application and web servers are not hosted on the same machine as the database server...

Network Printer Security Best Practices

Multifunction printers (MFPs) are experiencing an identity crisis: IT administrators don't always see them as the full-fledged networked computers they really are. But attackers do - and they are finding them increasingly very attractive!

These printers, shoved in the corner of the office and quietly going about their business of copying, printing, faxing and scanning, might not seem to pose any real security risk. But like any networked device, if not properly managed, they can expose sensitive campus data to unauthorized access and misuse.

To secure your printers from...

Data Privacy Videos

Short videos for protecting your privacy online

Too busy to read our articles? Here are three, short videos to give you some tools to help you "Own Your Privacy."

Back-to-School Cybersecurity Tips

The new school year is an exciting time for students, faculty, and staff. It's also an exciting time for hackers, identity thieves, and other unscrupulous types who take advantage of people during this busy time of year.

Watch out for typical beginning-of-the-year scams: Emails supposedly containing “important information about your UC account,” or a “problem with your registration”. Scams designed to cheat students out of money, such as scholarship scams, fake “tuition payment processors”, textbook rental or book-buying scams, housing scams, tutoring scams, and...

Up-to-date on updates: Keeping your software fresh

September 6, 2019

Software updates are sort of like exercise: Not everyone thinks about it, but everyone needs it, and they can make a big difference in keeping a system healthy. Let’s take a quick minute to talk about updates.

Updates help keep a piece of software or a system current. Because new threats are being developed all the time, manufacturers will send out fixes and updates to help protect their users from new threats — or just from problems they didn’t find when the software was first made. If you don't download and apply the update to fix the problem, you're basically leaving a door open...