IT Security For Students

Password Management

You probably wouldn’t give your ATM card and PIN to a stranger and then walk away. So, why would you give away your username and password? Your login credentials protect information as valuable as the money in your checking account.

Read more

Cyber Security Checkup

What better way to make sure you're secure with a cyber security checkup? View the documents below to follow best practices for securing your devices on or off-campus. 

UCSB Cyber Security Checkup

UCSB Cyber Security Checkup (Off-Campus)


Ransomware Safety

Ransomware is a type of malicious software, or malware, designed to deny access to a computer system or data until a ransom is paid. Ransomware typically spreads through phishing emails or when users unknowingly visit an infected website.

Learn more about Ransomware - What it is & How to prevent it

PC Management

PCs and Macs are targets of cybercriminals. They exploit your devices to steal your data and use your device to attack others. Here are some things you can do to help ensure that you are not a victim.

Read more

Social Media Security

From posting reviews to keeping in touch with family, social media can enhance our lives. However, it also poses security risks that are uniquely its own. In order to ensure you and your family's safety, we recommend the following security guidelines when using social media.

Read more

Identifying Phishing Scams

Phishing (pronounced "fishing") is an email scam designed to acquire sensitive information from the target (you). The most successful phishing emails are designed to look like the email comes from a reputable source.

Read more

Active Campus Surveys

Information Security Articles, References, & Blogs

For a deeper look into Information Security, check out our extensive list of articles, blogs, and more!


IT Security Systems Used On Campus

Pulse Secure - This is the secured VPN client application used on campus, an integrated virtual private network with network access control and mobile security solutions.

Palo Alto - Enables the prevention of successful cyberattacks with an automated approach that delivers consistent security across clouds, networks, and mobile devices

Duo - Allows for Multi-factor Authentication (MFA)

Sophos - Products for communication endpoint, encryption, network security, email security, mobile security and unified threat management (malware prevention).