Link: UCOP's e-newsletter

Stay Informed. Stay Connected.

What to do if you’re the victim of a cyberattack or notice suspicious online activity

Cybercriminals use phishing emails, text messages and voice calls to get a foothold inside our network — and then launch more attacks.


Safiya Noble, an associate professor of gender studies and African American studies, and co-founder of the UCLA Center for Critical Internet Inquiry, is a 2021 MacArthur fellow.

Data Privacy Day panel discussion will feature Safiya Noble and systemwide UC experts

On Jan. 28, UC data and privacy experts will convene to discuss social media's impact on society, UC’s role in protecting data privacy and your role in data control and protection.


Woman using laptop computer

Explore social media’s impact through “The Social Dilemma”

Explore the consequences of our dependence on social media by watching a fascinating documentary film, then joining UC experts for an in-depth discussion.


UCOP launches data loss prevention project

Cyber threats are on the rise. ITS is strengthening UCOP’s data security measures through a new data loss prevention software, Forcepoint.


laptop computer with file cabinet on monitor

The do’s and don’ts of secure file storage

Does your desktop contain files, files, everywhere? Here’s how to control the chaos and secure your important files.


Learn about cybersecurity from an FBI agent and UC expert

On May 20, join the UC Systemwide Cyber Champions Team for a webinar on how best to protect ourselves and the organizations we serve through cybersecurity best practices.


Man working on laptop

Reminder: Sign up for free Experian credit monitoring and identity protection services

UC is one of several institutions targeted by a nationwide cyber-attack. Here’s what you need to do to preserve your personal information.


Man looking at computer in dark room

More answers to questions about the Accellion data breach

UC was targeted by a nationwide cyber-attack on Accellion’s File Transfer Appliance (FTA), a vendor service used for transferring sensitive information. Here’s what you need to know.


Be cyber smart: 5 tips to protect your security

It’s more important than ever to follow best practices for cybersecurity — whether you’re at home or in the office.