Skip to main content
Information Security
Information Security
About Us
Services
Team Members
Contact Us
Policies
Resources
Find a Resource
For Students
For Faculty
For IT Staff
IRM
CSF
Risk Assessment
News
Calendar
Directory
Giving
UF Health
UF IFAS
Search UF
Submit
Search UF
Submit
Security Resources
Find a resource
For Faculty
For IT Staff
For Students
Backup and Recovery Template
Copyright Information
Digital Millenium Copyright Act (DMCA) Notice
Data Security
Passwords
Email Safety
Reporting Email Abuse at UF
Identity Theft and Scams
Phishing
Spam
Tips for Safe Email
Electronic Mail Policy FAQ
Identity Theft
Incident Response Procedures
Computer Security Incident Response Team
Responding to Low Severity Security Incidents
ISA/ISM
ISA/ISM Roles
Find your ISA/ISM
ISA/ISM FAQ’s
Information Security Leadership
Media Disposal
Mobile Device Security
Lost or Stolen Mobile Device Procedure
Mobile Device Security FAQ
Android
Apple iOS
Apple macOS
Microsoft Windows (BitLocker)
Unsupported Operating Systems
Protect Yourself
Risk Assessment
Creating an Information System/Data Flow Diagram
Review Request
Securely Deleting Electronic and Paper Records
Software Security Guidelines
Training
Employee Guide to Information Security
Information Security Training
SANS Ouch! A Security Newsletter for End Users
UF FERPA Tutorial
UF HIPAA Training
Traveling Abroad
USB Drives
Protect Your Computer
Ransomware
Protect My...
Computer
Protect My Email
Protect My Mobile Device
Protect Yourself From Social Engineering
Tailgating
Baiting
Quid Pro Quo
Dumpster Diving
Pretexting
Practices to Protect Yourself
What To Do If You Think You Are A Victim
Vishing and Smishing
Deepfakes
MFA Bombing
Protect My Privacy
Cache and Cookies
UF Cybersecurity Framework (CSF)
Acceptable Encryption Products and Algorithms
Prohibited Technologies
Unit Security Plans
Identify Function