Link: UCOP's e-newsletter

Stay Informed. Stay Connected.

UC Investments team members

New UC Investments Security Program provides enhanced financial data security

The partnership between UC Investments and Technology Delivery Services provides customized cybersecurity to meet UC Investments' unique needs.


UC Davis student walking on campus wearing pink backback

2023 Cyber Risk Program annual report spotlights UC Cyber security initiatives

The report spotlights the initiatives, people, services and tools that manage and reduce cyber risk at every UC campus, health center and lab.


UC update on March 2023 Delta Dental data breach

When UC learned of this breach, we partnered with Delta Dental to notify impacted employees and ensure the continued safety of employee account information.


Beware of phishing emails impersonating UCPath

UCPath is alerting employees of new phishing email scams that are targeting UC employees by falsely impersonating UCPath.


Blue keyboard

Be CyberSafe every day with these 3 tips

Cybersecurity Awareness Month is a perfect opportunity to pause, reflect and recommit to staying safe and secure online.


Blue keyboard

Protect Your Digital Life – Be CyberSafe

Celebrate Cybersecurity Month by learning about and addressing security challenges to protect yourself and our university community.


UC Berkeley students are targeting cyber risk

A new course gives UC Berkeley students an opportunity to gain hands-on experience with security testing for campus web applications.


LastPass

Last Pass security incident: Action required

During the week of Dec. 19, 2022, LastPass announced that customer information and encrypted password vaults were stolen.


Protect your data when you leave UC

Whether you are transitioning between positions at UC, retiring, or otherwise leaving UC, your exit process requires safeguarding UC data.


What to do if you’re the victim of a cyberattack or notice suspicious online activity

Cybercriminals use phishing emails, text messages and voice calls to get a foothold inside our network — and then launch more attacks.