Cybersecurity Awareness

Settings for Securing Zoom

UC Berkeley Zoom

UC Berkeley's Zoom service may only be used for P3 (and below) data according to the Berkeley Data Classification Standard and may not be used to transmit or store P4 data including, but not limited to: Social Security numbers, financial account numbers, or export controlled data. Refer to the Data Classification Standard for a comprehensive list of P4 data types.

This applies...

Securing Home Wi-Fi

Find your router’s web page

Here are instructions on how to find your router’s IP address. Once you have the IP address (e.g., 192.128.1.1) type it into an address bar (aka URL bar).

...

Security Reminders as We Approach Tax Season

General reminders and best practices: File electronically and use direct deposit for the quickest refunds. File early - the earlier, the better. Filing early helps prevent identity fraud; others cannot file a fake return in your name if you have already filed. Remember that the IRS will never request payment over the phone, or ask for personal information through emails or text messages

Data Privacy Week 2022

January 24 - 28th is Data Privacy Week

Data Privacy Week is an annual campaign to spread awareness about data privacy and educate individuals on how to secure their personal information. It also works to encourage businesses to respect privacy and be more transparent about how they collect, store and use data.

This year, Data Privacy Week 2022, spotlights the value of information and how to “Keep It Private”. Get started with NCA’s ...

Data Privacy Day 2020

Manage Your Privacy Settings: 1. Secure all devices, especially smartphones.

Smartphones are carried by virtually everyone and often they contain our most personal information. Whether iPhone or Android, research the best way to secure it for full privacy including options such as remote wipe.

2. Use a unique password for each site.

That way, if one of your passwords gets compromised, the others are still safe. Use complex passwords and never share them. Using multi-factor authentication (MFA) wherever possible will help protect you even more. Keep your university and personal...

MSSND: How to Secure Devices

Device Security

If you have a personally-managed Windows, Mac, IOS, or Android device that needs to comply with MSSND requirements, follow the step-by-step instructions below for how to configure your device to meet campus policy.

MSSND #1: Patching and Updates

We also provide optional guidance to assist with achieving the “...

Data Privacy Week Posters

Own Your Privacy

Learn how to review privacy settings for Google Calendar (bCal), Google Groups (bConnected Lists), and Google Drive (bDrive).

Click on the image(s) to download the pdfs.

Database Hardening Best Practices

This checklist was developed by IST system administrators to provide guidance for securing databases storing sensitive or protected data. Implementing these security controls will help to prevent data loss, leakage, or unauthorized access to your databases.

Physical Database Server Security The physical machine hosting a database is housed in a secured, locked and monitored environment to prevent unauthorized entry, access or theft. Application and web servers are not hosted on the same machine as the database server...

Network Printer Security Best Practices

Multifunction printers (MFPs) are experiencing an identity crisis: IT administrators don't always see them as the full-fledged networked computers they really are. But attackers do - and they are finding them increasingly very attractive!

These printers, shoved in the corner of the office and quietly going about their business of copying, printing, faxing and scanning, might not seem to pose any real security risk. But like any networked device, if not properly managed, they can expose sensitive campus data to unauthorized access and misuse.

To secure your printers from...

Data Privacy Videos

Short videos for protecting your privacy online

Too busy to read our articles? Here are three, short videos to give you some tools to help you "Own Your Privacy."