Identifying Phishing Scams

Phishing (pronounced "fishing") is an email scam designed to acquire sensitive information from the target (you). The most successful phishing emails look like the email comes from a reputable source. According to a data breach investigations report, 21% of ransomware attacks involve social actions such as phishing (see the Ransomware section below).  

 

Social Media Security

From posting reviews to keeping in touch with family, social media can enhance our lives. However, it also poses unique security risks that are unique. To ensure you and your family's safety, we recommend the following security guidelines when using social media.

Read more about social media security

Text Message Impersonation

If you discover evidence that suggests you are being impersonated via text messages to students or other staff, we strongly recommend sending a note to all students or staff that may be affected, making them aware of the scam.

Read more about text message impersonation


 

Ransomware

Ransomware is a type of malicious software, or malware, designed to deny access to a computer system or data until a ransom is paid. Ransomware typically spreads through phishing emails or when users unknowingly visit an infected website.

Learn more about Ransomware:


 

Secure Your Devices

Review the articles below to protect your UCSB and personal accounts

Password Best Practices

You probably wouldn’t give your ATM card and PIN to a stranger and then walk away. So, why would you give away your username and password? Your login credentials protect information as valuable as the money in your checking account.

Read more

Cybersecurity Checkup

What better way to make sure you're secure with a cyber security checkup? View the documents below to follow best practices for securing your devices on or off-campus. 

UCSB Cybersecurity Checkup

UCSB Cybersecurity Checkup (Off-Campus)

PC Management

PCs and Macs are targets of cybercriminals. They exploit your devices to steal your data and use your device to attack others. Here are some things you can do to help ensure that you are not a victim.

Read more

UCSB handshake icon

Do you want to work in cybersecurity or learn more about we protect UCSB's critical systems? 

Visit the resources below to find job postings and cybersecurity groups at UCSB. 

  • Cybersecurity job postings (coming soon!)
  • Cybersecurity clubs at UCSB (coming soon!)

Information Security Articles, References, & Blogs

  • For a deeper look into Information Security, check out our extensive list of articles, blogs, and more!