What to do if you’re the victim of a cyberattack or notice suspicious online activity
Cybercriminals use phishing emails, text messages and voice calls to get a foothold inside our network — and then launch more attacks.
Cybercriminals use phishing emails, text messages and voice calls to get a foothold inside our network — and then launch more attacks.
Get an easy-to-understand overview of why link descriptors like "click here" and "read more" are problematic, best practices to use instead and real-life examples to draw from.
The UCOP Accessibility Work Group has compiled helpful answers to frequently asked questions about accessible PDFs. Learn the basics and get your docs up to speed!
It’s more important than ever to follow best practices for cybersecurity — whether you’re at home or in the office.
We all get too much email – including copies or replies that aren’t relevant to us. Here’s how to follow good email practices to reduce volume, be effective and show consideration for colleagues.
Cyber Security Month is coming to an end. Recap what you’ve learned this month by reviewing these important tips for staying safe online.
Learn where to store secure files, plus three tips for keeping UC data safe.
IT Client Services has identified a new system to centrally manage Mac devices. Here’s what to expect.
Starting in August, people who create web content for UCOP.edu will need to follow a new process to ensure that content is accessible. But that’s not the only time accessibility matters. Here’s what you need to know.
Join the conversation on Zoom Chat and make sure you’re on Zoom 5.0 or higher for an optimal Zoom experience.
Here’s how to practice professionalism in a socially distanced world.
We’ve compiled some tips for everything Zoom — from security features to backgrounds to how-to webinars.