GENERAL AWARENESS VIDEOS
New Student Account Set-Up
This video explains and demonstrates the steps new students will need to take once their UCR undergraduate application has been received for review.
Student Technology Overview
This video provides an overview of some of the technology solutions provided by ITS that are available to UCR students.
Using the UCR Self Service Laptop Checkout Kiosks
This video tutorial provides instruction on how to check out and return a device from the UCR self-service laptop checkout kiosks.
Student Access to Software
This video provides students with information on the various ways they can access the software needed to complete their coursework and how to access those resources.
GENERAL AWARENESS VIDEOS
Introduction to UCR ITS
This video is used to introduce staff that are new to UCR to ITS and the services provided.
Introduction to ITS Job Aid
ITS Resources for Staff
ITS Website and Service Portal Introduction
This video provides an overview of the ITS Website and Service Portal
Accessing ITS Self-help and Training Tools
This video provides an overview of ITS help resources including getting information about technical problems, using the ITS Knowledge Base, accessing ITS support and utilizing training resources.
Reporting an IT Problem to ITS
This video provides an overview of how ITS processes problems reported by campus users.
Microsoft Office 365 Introduction
New to MS Office 365? Watch our short introductory video to understand how to access Office 365 and the applications available to you.
UCR Multi-factor Authentication (MFA): Enrollment Tutorial
This video provides an overview of Multi-Factor authentication at UCR.
GUIDANCE DOCUMENTS
This guide provides basic information and access to resources that will help you get up and running on Google Drive (R'Docs).
This interactive guide provides an overview of OneDrive functionality including creating and sharing folders, uploading to OneDrive and how to synch OneDrive files with your computer or device.
This interactive guide provides an overview of Microsoft Teams functionality including using chat and teams, creating teams and managing meetings using teams.
This interactive guide provides an overview of SharePoint, including using SharePoint pages, SharePoint Document Libraries, and editing and creating SharePoint pages.
This course provides an overview of DocuSign functionality including the signing and sending of documents, setting up documents for completion and signature and completing and signing received documents.
This course provides an overview of the Power BI Service and Desktop. It introduces you to the various elements of Power BI, as well as how to connect and work with data. The course will also provide you with the basics of building and publishing reports.
GENERAL AWARENESS VIDEOS
UCR Calls for Cyber Security Superheroes
October is Cyber Security Awareness Month. See what you can do to become a UCR Cyber Security Superhero!
Security Tips for Keeping Your Data Safe
This video provides information on some simple steps you can take to make sure your data is secure.
PhishAlarm Introduction
This video introduces PhishAlarm to the UCR campus by explaining what it is, how to use it and how to get additional information.
ITS Email Phishing Campaign Recap
This video provides a recap of the ongoing email phishing campaign run by ITS from May 2022 - July 2023.
PHISHING EMAIL EXAMPLE VIDEOS
The videos below provide examples of the types of phishing emails that are received across UCR. Each video highlights what to look out for when verifying whether or not an email is legitimate, where to get additional information and how to report suspicious emails.
Please feel free to share these videos.
Office 365 Lure
This video provides an example of a phishing email that appears to come from Microsoft. It provides an overview of what to look out for in emails of this type, how to report phishing emails and where to go for help and information.
Credential Compromise Lure
This video provides an example of a phishing email that is designed to trick the recipient into providing their login credentials. It provides an overview of what to look out for in emails of this type, how to report phishing emails and where to go for help and information.
File Sharing Email Lure
This video provides an example of a phishing email that appears to come from a file sharing service. It provides an overview of what to look out for in emails of this type, how to report phishing emails and where to go for help and information.
TurboTax Lure
This video provides an example of a phishing email that appears to come from TurboTax. It also provides some tips on what to look out for during tax season.
CDC Lure
This video provides an example of a phishing email that appears to provide information about a job opportunity. It provides an overview of what to look out for in emails of this type, how to report phishing emails and where to go for help and information.
Job Offer Lure
This video provides an example of a phishing email that appears to provide information about a job opportunity. It provides an overview of what to look out for in emails of this type, how to report phishing emails and where to go for help and information.
USPS Lure
This video provides an example of a phishing email that appears to come from the USPS. The video explains what to look out for in emails of this type and provides tips on how to prevent yourself from becoming a victim of one of these scams.
Gift Card Lure
This video provides an example of a phishing email that requests that the recipient buys gift cards on the behalf of another individual. It provides an overview of what to look out for in emails of this type, how to report phishing emails and where to go for help and information.
Google Chrome Lure
This video provides an example of a phishing email that appears to prompt the user to update Google Chrome. It provides an overview of what to look out for in emails of this type, how to report phishing emails and where to go for help and information.
Google Drive Lure
This video provides an example of a phishing email that appears to come from Google Drive. It provides an overview of what to look out for in emails of this type, how to report phishing emails and where to go for help and information.
DHL Lure
This video provides an example of a phishing email that appears to come from DHL. It provides an overview of what to look out for in emails of this type and where to go for help and information.
MS Voicenote Lure
This video provides an example of a phishing email that appears to come from Microsoft Voicenote. It provides an overview of what to look out for in emails of this type and where to go for help and information.
iTunes Lure
This video provides an example of a phishing email that appears to come from iTunes. It provides an overview of what to look out for in emails of this type and where to go for help and information.
Intuit Lure
This video provides an example of a phishing email that appears to come from Intuit. It provides an overview of what to look out for in emails of this type and where to go for help and information.
DHL Lure
This video provides an example of a phishing email that appears to come from DHL. It provides an overview of what to look out for in emails of this type and where to go for help and information.
Zoom Lure
This video provides an example of a phishing email that appears to come from Zoom. The video explains what to look out for in emails of this type and provides tips on what you should expect to see in legitimate emails.
2 Factor Authentication (Google Email)
This video provides an example of an email that appears to come from Google requiring the completion of a 2 factor authentication setup. The video explains what to lookout for in this type of email to prevent exposure to scams.
2 Factor Authentication (Outlook Email)
This video provides an example of an email that appears to come from Microsoft requiring the completion of a 2 factor authentication setup. The video explains what to lookout for in this type of email to prevent exposure to scams.
Need More Cybersecurity Information?
For more information on identifying phishing emails, check out of Tips for Spotting Phishing Emails guide.
To get more information and best practices for staying secure, visit our Cybersmart page.
GENERAL AWARENESS VIDEOS
ITS Project Creation and the Governance Process
This video provides an overview of the processes ITS adheres to in order to create and execute projects.
ITS Services Overview
This video provides an overview of ITS and the services provided.