Cybersecurity Awareness

Enabling Full Disk Encryption

Overview

Full disk encryption should be implemented for all portable devices when:

Storing or processing Institutional Information classified at P3 or higher

External requirements mandate the use of full disk encryption (such as research Data Use Agreements with third-party data providers)

Full disk encryption protects the data on your device in the event it is lost or...

Ransomware Toolkit

ransomware image

Ransomware is not new; but, it's been popping up more and more in higher ed. Each week brings news of colleges and universities that have fallen victim to ransomware attacks. Some hackers demand payment, while others steal personal data (to sell to identity thieves). Whatever the motives are,...

Ransomware

Learn how to protect yourself from ransomware with these flyers, tips, and videos.

Securing IoT Devices

While many have come to rely on Internet of Things (IoT) devices for added efficiency and convenience, the devices are also entry points cybercriminals can use to violate your security and privacy. According to Symantec’s 2019 Internet Security Threat Report (ISTR 24), “IoT devices experience an average of 5,200 attacks per month. Routers and connected cameras were the main source of IoT attacks accounting for over 90 percent of activity.” Various IoT devices have been exploited: baby monitors; security...

SSH Key Management

A SSH key with a passphrase provides additional security and can act as an additional authentication factor. Adding a passphrase to your SSH keys is recommended to comply with the Remote Access Services Requirement of the Minimum Security Standard for Networked Devices (MSSND)

See instructions for...

Cybersecurity and COVID-19

Not finding what you're looking for?

Try our Search function!

Declutter Your Digital Files

It's easy for our digital selves to get cluttered and disorganized. A proper Marie Kondo approach to thinning out old files can keep your devices and information more secure. Plus it can improve the speed and performance of your devices.

Here are a few things you can do to improve your digital security and online safety:

1. Review Online Accounts Delete any online accounts no longer in use. If an account is still in use, remove any information that is no longer needed, like saved credit cards or documents in cloud storage. Review the privacy and security settings on websites...

Securing Your Data

Overview:

Data is one of UC Berkeley’s most critical assets. The complexity and volume of the data we are taking in is growing while at the same time regulatory requirements are becoming more stringent. These factors make correctly managing data vital for ensuring its confidentiality, integrity, and availability remain intact.

The data management lifecycle:

Proper handling of data throughout its lifecycle is critical to optimizing its utility, minimize the potential for errors, and protect it from breaches. No matter...

Backing Up Your Data

What is a Backup?

A backup is a second copy (or more) of your digital files and it can protect you from data loss. You can access this backup in the event your device or data become inaccessible, destroyed, or damaged. Data loss can occur in many ways: a computer or hardware crash, a lost or stolen device, data corruption, or malware that encrypts it and holds it for ransom.

Two types of backup are sync services and traditional backups: Sync (or cloud) services backup individual files and do not include...

Best Practices for Telecommuting Securely

Please note: personally-owned computers used by multiple people in the household are unlikely to meet the Campus Minimum Security for Networked Devices (MSSND) Standard. Risks to consider with home systems include:

Multiple users with administrator access allow for download and spread of malware

Insecure configurations leave the systems vulnerable to attacks

Home use software installed that are not supported and may not be patched for vulnerabilities

Institutional information...