Security Best Practices

IT security best practice documentation and how-to articles

computer on desk

Guidelines for faculty and staff members to help facilitate remote work securely...more

holiday ornament

Learn to protect yourself while traveling abroad. Learn more…

 Photo montage of the Bruin Bear and plants, against a background of binary code

A good digital spring cleaning can help keep your devices and information safe and secure year-round. Here are some tips for a digital spring cleaning. Learn more...

image of people in the form of a padlock

The Internet is a very powerful and useful tool when used properly. Find out how to be a good cybercitizen. More...

Laptop on a desk with brick wall next to it

Ransomware—a type of malware that encrypts users’ files or locks their operating systems until a ransom is paid—has become an expensive security issue for institutions and individuals. Find out how to protect yourself... more

Circular image of people on computers

Have you ever wondered who, besides your friends and family, might be seeing that strange selfie you posted on Facebook? Or who knows about your upcoming vacation to London? As much as social media sites try to keep your online information secure, there are no guarantees that your posts are completely private... more

Screenshot of smart phone apps

With the number of social media apps and users increasing rapidly, we want to share some tips to help you manage your online reputation. Please keep this advice in mind when sharing online... more

Picture of Pac-Man figures

What can you do if, despite your best efforts, your account is hacked? And how would you know if it’s been hacked? Look for these signs... more

image of username and password

As hackers become more sophisticated, passwords become less effective. Many organizations—including UCLA—now offer multi-factor authentication (MFA), which relies on additional credentials besides your password. But what do you do if a site does not offer MFA, and a password is the only safeguard between your personal information and the criminal underworld?...more

Find tips that illustrate effective theft-prevention techniques and proactive measures to protect your devices and personal data...more