Information Technology Services
Most cases of compromised data are the result of unintentional actions, or inactions, and can be prevented by following good information security practices. Compromised data can result in major security breaches that damage work, careers and reputations, and are expensive to repair. Information security is everyone's responsibility.
To inform everyone about threats to information security and good practices to reduce the risks associated with those threats, UC has adopted a mandatory online Cyber Security Awareness course developed by SANS. The course is composed of several video modules covering a number of important information security topics. Learners watch each video and then answer questions to demonstrate understanding of the content. Learners will see a check box next to each module upon completion of the course.
The course can be completed over multiple sessions. The course will track and record modules the learner has completed.
Access the course through the UC Learning Center:
- Sign in with your UCOP login and password.
- Using the search box on the left, type in "Security Awareness".
- The course name and description will appear; be sure to select the appropriate learning language.
- Click "start" to launch the course; note that you must enable cookies in order for the course to begin.
Good habits are the foundation of cybersecurity just like they are for safety and security in the physical world -- like locking your front door or wearing your seat belt in the car.
Check out these eight important cybersecurity habits. Try to incorporate them into your online life so they become automatic. They will help protect your information, your family and your work. They'll also reduce your risk of getting scammed!
Some additional tips:
- Password protect all of your devices. Use complex passwords that would be fairly complicated for someone else to guess but easy for you to remember. Never share your password.
- Be aware of suspicious e-mails encouraging you to take action requiring your login information. This is a common way phishers gain access to your information.
- Be cautious when posting UCOP related information on Social Media.
Never post non-public work-related information online.
- Look for “https://” (as opposd to http) in the URL to indicate a secure connection when submitting information online. e.g. https://atyourserviceonline.ucop.edu/
From UCOP's New Employee Orientation. This 2-page handout (pdf) is a good, general-purpose cybersecurity reference for work and home. Includes:
- "Security is Everyone's Responsibility"
- Eight Highly Effective Habits for Cybersecurity
- Reporting suspicious incidents, spam and phishing
- Multi-factor authentication
- Keeping your devices patched and up to date
- Phishing - how to protect yourself
- Lost or stolen devices
- Getting help