Link: UCOP's e-newsletter

Stay Informed. Stay Connected.

Be vigilant with “urgent” messages: Protect your information from phishing scams

Follow these tips from UCOP ITS to protect your accounts.


Zoom logo

Oakland staff: New Zoom Rooms — and training to use them

UCOP will soon be adding more Zoom Rooms, allowing for seamless and convenient video conferencing directly from our conference rooms!


Man working on laptop

Changes coming to UCPath logins on July 31

In its ongoing efforts to protect UCOP and employee data, ITS is taking steps to strengthen security for UCPath logins.


Person using laptop computer on desk

Action required: Additional security coming to VPN

Multi-factor authentication adds an extra layer of security in verifying a remote-access user’s identity.


box

Box Classifications are now live

UCOP Information Technology Services has deployed data security classifications and classification-based controls within Box.


Women discussing something on a computer screen

New IT service offerings for software selection

If you've ever struggled to acquire new tech tools and software — including determining the options and best fit for your needs — UCOP IT Client Services is here to help.


Gray kitten sitting on a laptop computer

How to maintain your UCOP devices and equipment

Are you protecting your UCOP-issued laptop and phone? Check out these guidelines to be sure.


Protect your data when you leave UC

Whether you are transitioning between positions at UC, retiring, or otherwise leaving UC, your exit process requires safeguarding UC data.


zoom whiteboard

Increase engagement during virtual meetings with Zoom Whiteboard

This platform is a great way to enhance collaboration before, during and after Zoom meetings.


New IT service offering: LastPass

LastPass password manager will make it easier than ever for you to remember all passwords for your work accounts.


What to do if you’re the victim of a cyberattack or notice suspicious online activity

Cybercriminals use phishing emails, text messages and voice calls to get a foothold inside our network — and then launch more attacks.


Amy Chen

No more “click here”: Amy Chen shares why descriptive link text is important

Get an easy-to-understand overview of why link descriptors like "click here" and "read more" are problematic, best practices to use instead and real-life examples to draw from.