Ongoing research

Information Technology : Page

Acceptable Use

UCANR–owned electronic communications resources, such as computers purchased with ANR funds, are provided to advance our mission by supporting our programs, research, teaching, public service, and administrative functions.Use of UCANR devices is subject to university policy, including but not limited to…
View Page
Information Technology : Page

Phishing

Social engineering manipulates individuals to gain access to sensitive information or perform certain actions. When this takes place over email, phone, or text message, this is known as phishing, vishing, or smishing.
View Page
Information Technology : Page

IWP Office Hours Notes

As we near migration from Site Builder and release of IWP there are many questions folks have. This is a compilation of recent questions and answers from those sessions. It's important to understand that things will be changing as we move over to the new platform.
View Page
Information Technology : Page

Tips to Smooth Migration Process

Here are 4 steps to streamline migration and help make your site more usable immediately after migration. In general, it's easier to make adjustments in Site Builder now, rather than devise a "fix" in Drupal/IWP later. 1. Remove multi-column layouts.
View Page
Information Technology : Page

Report Incidents

Security Incidents must be reported to IT immediately. If you have encountered any of the following, please contact help@ucanr.edu or call Help Desk at (530) 750-1212. Unauthorized Access: If you suspect someone has gained access to your accounts or devices.
View Page
Information Technology : Page

Update Your Staff Directory

It's very important that your staff directory is up-to-date, particularly with respect to the Director and Unit Information Security Lead roles. The people who fill those roles (according to the ANR Directory) will be selected for communications related to Information Security.
View Page
Information Technology : Page

Update Your Staff Directory (Directors)

Updating your staff directory is always a good idea to ensure that mailing lists are kept up to date and only staff have access to critical UC ANR systems. Recently, UC ANR began developing a new cybersecurity program based on requirements from UCOP.
View Page
Information Technology : Page

Vendor Risk Assessments

The IS-3 Electronic Information Security policy requires all software vendors (suppliers) to undergo thorough scrutiny to mitigate security risks. ANR has implemented a Vendor Risk Assessment process to comply with this policy. This helps us identify and address potential security vulnerabilities associated…
View Page