Develop Safe Habits

Common cybersecurity tips

Roles and Responsibilities Policy

University of California, Berkeley

Policy Issued: 04/01/2022

Effective Date: 04/01/2023

Supersedes: N/A - New policy

Next Review Date: 04/01/2027

UCB Seal

Roles and...

Students beware of employment scams via email

March 20, 2023

We want to alert students to be aware of emails they may receive about internship or employment opportunities. Phishing scams are on the rise and may come in via email, text, and phone calls. Your best line of defense is to not click on links within an email that you are at all suspicious of and never fill out any forms that you receive via email that ask for personal or financial information. Here are a few more tips to keep your information safe:

Know your opponent and how to dodge...

Password Management with LastPass

Overview

Creating strong, unique passwords for each of your personal and work accounts isn't a chore when using a password manager - like LastPass. LastPass can generate and remember passwords for you - no more writing your passwords down and potentially exposing your credentials. Using strong and unique passwords on each of your accounts increases your personal and professional online security.

UC Berkeley offers FREE...

Security Tips for Travel

We often take for granted what it means to travel with our devices and staying digitally connected often means connecting to public networks in hotels, airports, train stations, and conference halls, that employ minimal security measures. Public networks may harbor malware from cybercriminals looking to steal your data for identity fraud, as well as nation-state actors targeting academic and business...

Security Tips for International Travel

International TravelFor members of the campus community, a trip to a foreign country presents unique data security challenges. The nature of international travel requires you to use your device (laptop, tablet or smartphone) in various unfamiliar places that may expose your data and device to malicious people and software.

...

Traffic Light Protocol

Overview

The Traffic Light Protocol (TLP) was created to facilitate greater sharing of information. TLP is a set of designations used to ensure that sensitive information is shared with appropriate audiences.

TLP uses four colors to define sharing boundaries to be applied by the recipient(s) indicating when and how sensitive information can be shared, and by facilitating more frequent and effective collaboration. TLP is optimized for ease of adoption, human readability and person-to-person sharing; it may be used in automated sharing exchanges...

Declutter Your Digital Files

It's easy for our digital selves to get cluttered and disorganized. A proper Marie Kondo approach to thinning out old files can keep your devices and information more secure. Plus it can improve the speed and performance of your devices.

Here are a few things you can do to improve your digital security and online safety:

1. Review Online Accounts Delete any online accounts no longer in use. If an account is still in use, remove any information that is no longer needed, like saved credit cards or documents in cloud storage. Review the privacy and security settings on websites...

Securing Your Data

Overview:

Data is one of UC Berkeley’s most critical assets. The complexity and volume of the data we are taking in is growing while at the same time regulatory requirements are becoming more stringent. These factors make correctly managing data vital for ensuring its confidentiality, integrity, and availability remain intact.

The data management lifecycle:

Proper handling of data throughout its lifecycle is critical to optimizing its utility, minimize the potential for errors, and protect it from breaches. No matter...

Backing Up Your Data

What is a Backup?

A backup is a second copy (or more) of your digital files and it can protect you from data loss. You can access this backup in the event your device or data become inaccessible, destroyed, or damaged. Data loss can occur in many ways: a computer or hardware crash, a lost or stolen device, data corruption, or malware that encrypts it and holds it for ransom.

Two types of backup are sync services and traditional backups: Sync (or cloud) services backup individual files and do not include...

Best Practices for Telecommuting Securely

Please note: personally-owned computers used by multiple people in the household are unlikely to meet the Campus Minimum Security for Networked Devices (MSSND) Standard. Risks to consider with home systems include:

Multiple users with administrator access allow for download and spread of malware

Insecure configurations leave the systems vulnerable to attacks

Home use software installed that are not supported and may not be patched for vulnerabilities

Institutional information...