UCLA Logo
Office of the Chief Information Security Officer

Main navigation

  • I Want To…
    • Avoid Data Breaches and Data Theft
    • Avoid Phishing Scams
    • Avoid Ransomware Attacks
    • Avoid Threats
    • Develop Safe Habits
    • Incidents & Requests
    • Passwords & Authentication
    • Personal Device Protection
    • Use the Right Tools
  • Services
    • FireEye Endpoint Security (Antivirus)
      • FireEye Endpoint Security FAQs
    • High Compliance Environment (HCE)
    • LastPass
    • Multi-factor Authentication (MFA)
      • Changes to the DUO prompt
    • Patch Management (Ivanti)
    • Spirion Identity Finder
    • Third Party Risk Management (TPRM)
      • TPRM Latest Updates
      • TPRM Approved Vendors
      • TPRM Triage Form (Create, Complete, and Review )
      • TPRM FAQs
    • Threat Detection & Identification
    • Vulnerability Management
    • Web Application Scanning
  • Governance
    • IT Security Policies
  • Resources
    • COVID-19: Cybersecurity
    • Security Best Practices
    • Tools
      • Antivirus Protection
      • Online Security Glossary
      • Scanning Tools
    • Training Courses
  • Security Assessment
    • Information Security Initiatives
  • News
    • All Security Advisories
    • Phish Bowl
  • Our Team
    • OCISO
    • Cybersecurity Operations
    • Identity & Access Management
    • Governance, Risk, and Compliance
  • IS-3 Implementation Plan
  • Contact Us
  • Home
  • Resources

Security Best Practices

Resources

  • COVID-19: Cybersecurity
  • Security Best Practices
  • Tools
  • Training Courses
computer at desk

Security Recommendations for Remote Work

Bruin bear head in front of a background of binary code

Clear Out Your Cyber Clutter With a Digital Spring Cleaning

People standing to form the shape of a lock

Good Cybercitizens Make the Internet a Safer Place

people sitting in a circle on computers

Are You Practicing Safe Social Networking?

photo of applications on a smartphone

Protect Your Online Identity

Image of Pac Man game

Think You've Been Hacked? Here's How to Shake It Off.

image of a username and password field

Step Up to Stronger Passwords

someone grabbing a phone out of another person's bag

Device Theft – What’s Your Personal Back-up Plan?

Ornament that looks like the world in a pile of snow

Stay Cyber Secure Wherever You Are This Holiday Season

holiday items and a credit card surrounding a laptop

Protect Yourself Online This Holiday Season

identity theft word cloud

Preventing Identity Theft

Social Media Security Guide

Stop think connect, graphic image of person at computer surrounded by several icons

Privacy and Internet Security

Guidelines for Securing Mobile Devices

international

Cybersecurity Guidelines for International Travel

pixels

Reporting Electronic Abuse

card with fish hook through it

Avoid the Bait. Don't Get Phished!

keyboard

Top 10 IT Security Recommendations

computer_lock

Protecting Personal Information

macbook

Securing Your Computer and Data

Tags
Security Best Practices
Site logo

Cybersecurity For:

  • Faculty & Staff
  • Students

IT Security Services

  • FireEye Endpoint
  • LastPass
  • MFA
  • Patch Management
  • Spirion
  • TDI
  • Third-Party Risk Management
  • Vulnerability Management
  • Web Application Management

News

  • All Security Advisories
Facebook Instagram Linked Twitter Youtube TikTok Snapchat

© 2023 Regents of the University of California

  • Emergency
  • Accessibility
  • Privacy & Terms of Use