Link: UCOP's e-newsletter

Stay Informed. Stay Connected.

What to do if you’re the victim of a cyberattack or notice suspicious online activity

Cybercriminals use phishing emails, text messages and voice calls to get a foothold inside our network — and then launch more attacks.


Avoid sending bulk email that looks “phishy”

If your department sends bulk email, UC needs your help. Here are some steps you can take to ensure colleagues and IT staff won't mistakenly view your message as spam.