Smiling UCR staff members review iPad



UCr Gold Line


Do your part - be cybersmart!

Follow the tips below to help ensure your personal and financial data stays safe while working and learning at UCR.

Want to make sure your data is safe, but don't know where to begin? This video provides information on some simple steps you can take towards making sure your data is as secure as possible. 

Be sure to use UCR’s VPN at when working. You can find VPN guidance on the UCR Knowledge Base. 

Ensure your devices are running the latest software updates. This includes updating your mobile phones, tablets, computers, Wi-Fi routers and any other Internet-attached devices.


Four key ways to keep the cybercriminals at bay:


UCr Gold Line


Should you trust that email or text message?

With electronic messaging being a mainstay of personal and professional communication, malicious actors often utilize email and text messages in an attempt to steal personal or private information. Phishing messages are crafted to look legitimate but contain malicious programming or content used to capture sensitive data, which can put you and the University at risk.

Fortunately, there are simple ways to spot a phishing email. Here are some warning signs to look out for:

hand taps computer screen and holds a pen
  • Bad grammar or punctuation
  • Strange fonts or paragraph spacing
  • Slightly modified email addresses
  • Forms that ask for sensitive information like usernames and passwords
  • Links to strange websites
  • Requests for money from what appears to be a “trusted” person
  • Language that creates a sense of urgency or ultimatum (i.e., "If you do not respond immediately you will be sent to collections")



UCr Gold Line


The Information Security Office is your partner in data security. 

Request a consultation to receive the security resources, unit-specific data, and policy information needed to be proactive and protected.   


UCr Gold Line


UC Riverside is a prime target of attacks from cybercriminals, including but not limited to phishing, ransomware, and job offer scams.

If you have noticed suspicious activity on your computer, tablet, or phone, please immediately report it to the Information Security Office.



return to top



Let us help you with your search