We use the Internet at work, home, for enjoyment, and to connect with those close to us. However, being constantly connected brings increased risk of theft, fraud, and abuse. Universities, which are characterized by their openness based on academic freedom, are among the most widely attacked targets. The University takes steps to ensure the security of our infrastructure and systems, but cybersecurity is a shared responsibility, and everyone can take a few simple steps to make the Internet more secure!
Detecting Fraudulent Job Opportunities
Recently, members of the UCSB community have reported receiving offers for fraudulent job opportunities. The UCSB IT Security Operations team would like to provide some guidance to help users identify job opportunities that may be a scam. Regardless of whether you are actively job seeking, you may receive emails, phone calls, texts, or other notifications of potentially fraudulent job opportunities. There are a few things you should keep in mind if you receive a message that you believe could be a scam.
Security For Faculty & Staff
Find more information for important security topics such as data backups and storage, phishing scams and information technology security best practices specifically relevant to faculty and staff at UC Santa Barbara.
Security For Students
Discover relevant security information for topics such as social media and password management best practices to help you be safe and prepared to handle IT security situations as a UC Santa Barbara student.
Security for IT Professionals
Find IT services and information specifically tailored to UC Santa Barbara IT professionals including Password Management Applications, Inventories, Web Application Security, and the UC Security Policy.
Visit here if you have Ransomware on your device or if you would like additional Ransomware resources!
Report Harassing or Unwanted Email
We encourage UCSB computer and network users to report email abuses as well as computer intrusions and other hostile activity.
Report Scanning, Hacking, and Other Hostile Activity
We take matters of hacking and other hostile activity seriously and will investigate all reports of abusive activity.
Report Lost or Stolen Computer Device
Complete this form to report your lost or stolen device to the Network Security Team. If this is an emergency, please contact the local authority.
News & Events
It is important to ensure that the digital “you” matches what you intend to share. It is also important to keep what’s private, private, for yourself and when you share about others. Owning your online presence will help to protect your identity, finances, and reputation – both now and in the future!
Online shopping grows increasingly popular each year. The holiday season has particularly noticed its impact: Cyber Monday is consistently one of the biggest online shopping days in U.S. history, and the boost in online shopping often continues throughout the season. Unfortunately, the ease and convenience of online shopping makes the holiday season a perfect time for cybercriminals to take advantage of unsuspecting online shoppers.
Ransomware is a type of malicious software (a.k.a malware) that locks the victim out of their computer or files – most often by encrypting them – until a ransom is paid. Ransomware is often spread through the use of stolen credentials, malicious links, and harmful attachments in emails; however, these are not the only delivery mechanisms. Other sources include malicious applications and files, and adware/spyware.
Multi-factor authentication (MFA) is defined as a system that requires more than one distinct authentication factor for successful login. Simply stated, a factor is something you have like a cell phone or something you know like a password. UCSB has recently been in the process of rolling out MFA for various applications, like UCPath and Kronos Timekeeping, with plans to use MFA for more applications over the next year.
Social engineering in the context of IT security is “any act that influences a person to take actions that may or may not be in their best interest.” It is often a confidence trick done to obtain access to systems and confidential data that can be part of a bigger scheme. It is still on the rise and is now the number one cause of cyber security breaches.
Phishing is an attempt, usually by email, to obtain your personal information in order to commit fraud. Cybercriminals use phishing to manipulate people into doing what they want.” Social engineering is at the heart of all phishing attacks, especially those conducted via email. These days technology makes phishing easy.
Any time you see an email related to COVID-19, take extra precautions. Look carefully at the source. Is it a real address or something designed to mislead you into thinking it's real?
On March 7, 2020, UCSB Enterprise Technology Services (ETS) will release the upgraded Single Sign-On (SSO) service. SSO is the service that enables our community to log in to many campus systems including Electronic Timekeeping and UCPath. The SSO upgrade prepares the Identity infrastructure for future modernization.
Over 200,000 UC students will be starting classes over the next couple of months. The new school year is an exciting time for students, faculty, and staff. It’s also an exciting time for hackers, identity thieves, and other unscrupulous types who take advantage of people during this busy time of year.
In the past few weeks, the campus experienced a rash of phishing attacks. The most common form is a short message that starts with something like, "quick help needed," "are you in the office?," or "available?" - Anything to attract a response. The messages often appear to come from vice chancellors, deans, and department chairs.
Traveling today is so much easier with technology -- whether it’s to the coffee shop around the corner or to a café in Paris. Unfortunately, traveling with devices can mean increased cyber risks for keeping your personal and University information private, as well as the potential for device theft.
Google incorporates user feedback to train its algorithms to recognize new phishing attacks. Both Horowitz and Lovan recommend reporting a message to Google if you suspect it is a phishing attack. You can do this directly from your online Gmail box.
They use clever techniques to induce a sense of urgency on your part so that you don't stop to think about whether they are legitimate or not. Some even target a select group of users and tend to be more specific and include information more detailed and familiar to the recipient.
Passwords are the key to almost everything you do online, and you probably have multiple passwords that you use throughout the day. Choosing hard-to-hack passwords and managing them securely can sometimes seem inconvenient.
Spear phishing emails are a special type of phishing email targeted to a select group of users. These emails tend to be more specific than a regular phishing email, including information more detailed and familiar to the recipient.
Security Personnel On Campus
Information Security at UCSB is a distributed effort shared among IT teams and individuals across campus. You can find key resources in your divisions, departments, and in ETS. Here are some places to start.