UC San Diego SearchMenu

Cybersecurity

Cloud Security and Your Data

Posted: 10 11 2017

Cloud storage defined External cloud storage is where data is stored and hosted online by third parties. Examples of services you may have used include: Uploading photographs to Flickr Uploading files to Dropbox Creating documents to Google Drive and Docs Remotely backuping your computer to a web-based service Flickr, Dropbox, and Google act...

Read the full post →

Category: Cybersecurity

DMCA and You

Posted: 10 11 2017

UC San Diego, in compliance with the federal Digital Millennium Copyright Act of 1998 ("DMCA"), can remove material from a website when it receives a DMCA request. You must secure appropriate permission when using copyrighted or trademarked material, such as text, logos, photographic images, video, sound, or graphic illustrations. Fair...

Read the full post →

Category: Cybersecurity

Preventing Identity Theft and Securing Personal Information

Posted: 10 11 2017

According to California law (PDF), UC San Diego must notify individuals if their computerized personal information is (or may have been) disclosed or acquired by an unauthorized person. Should the university fail to comply, UC San Diego may be charged substantial penalties for mishandling personal information. Personal information Personal...

Read the full post →

Category: Cybersecurity

Social Media and Security

Posted: 10 11 2017

From posting reviews to keeping in touch with family, social media can enhance our lives. However, it also poses unique security risks. In order to ensure the safety of you and your family, IT Services' security team recommends the following security guidelines when using social media.  Never post information that you would not...

Read the full post →

Category: Cybersecurity

Checking your Email Account for Forwarding

Posted: 9 15 2017

Why this is important for security When an email account is compromised we regularly discover that the hacker has set up a forward in the account. This forward sends your email to the hacker's account. Anytime your email account has been compromised or your email password has been exposed (for example, through a phishing email),...

Read the full post →

Category: Cybersecurity

Disaster Tips on Cyber and Social Engineering Scams

Posted: 9 15 2017

Following natural disasters, it is inevitable that “bad actors” will attempt to use the event as a way to scam money for their own pockets. Two types of people are affected; those that were hit by misfortune, and those caring people that desire to help. Victims are scammed largely by a short list: Flood Insurance Robocall...

Read the full post →

Category: Cybersecurity

Equifax Data Breach

Posted: 9 9 2017

The public recently learned that the Credit Bureau Equifax suffered a major security breach. Reports indicate that approximately 143 million accounts were compromised, including (at a minimum): Names Addresses Social Security numbers Birthdates We anticipate that in addition to a higher than usual threat of identity theft due to this incident,...

Read the full post →

Category: Cybersecurity

Illegal File Sharing & Copyright Infringement

Posted: 2 22 2017

DMCA (Digital Millennium Copyright Act) violations by faculty, staff and students are up significantly. DMCA protects the rights of owners of copyrighted materials such as music, movies, TV shows, and computer software. Except when as you comply with fair use guidelines (see below), if you use software or websites to download or upload...

Read the full post →

Category: Cybersecurity

Online Privacy

Posted: 2 22 2017

Learn to keep what’s private, private. You exist in digital form all over the internet. It is thus important to ensure that the digital you matches what you are intending to share. It is also critical to guard your privacy — not only to avoid embarrassment, but also to protect your identity and finances. Take these steps to...

Read the full post →

Category: Cybersecurity