How to Stay Secure
The information provided here is designed to help protect your computer, yourself, and the campus from security attacks.
UCSC has Minimum Network Connectivity Requirements for all devices connected to the campus network. The links below will help you understand these requirements. Devices that don't meet them may be disconnected from the campus network.
- Install Operating System and Software Updates
- Use Malicious Software Protection (e.g. Anti-Virus)
- Turn On Your Computer's Firewall
- Protect Passwords
- Send Passwords and Restricted Data Securely
- Physical Security is Important, Too
- Lock Your Computer Screen
- Turn Off Unnecessary Services
- No Open Email Relays or Unauthorized Proxy Servers
- Security Audit Agents
ITS can assist you in configuring your computer to meet these requirements. To request this service, or if you have questions or concerns, contact the ITS Support Center.
The ITS "Top 10 List" of Good Computing Practices provides general good computing practices and tips that apply to most people who use a computer.
Also see our printable "Cyber Security at UC Santa Cruz" Brochure (PDF), which includes the "Top 10 List" plus other cyber security tips and resources.
Additional information to help keep your computer and data safe and secure:
- Protect Information when using the Internet and email
- Google Privacy and Security Tips
- Beware of Scams
- Prevent Identity Theft
- Mobile Devices and Wireless
- Don't Download Unknown or Unsolicited Programs or Files
- Back Up Important Files
- Home Computer Security
- Travel Securely
- October is National Cyber Security Awareness Month
- Cyber Security at UC Santa Cruz Brochure (PDF)
- Cyber Security Archive Information
Here are some security-related tools and resources available to everyone in the UCSC community.
- Google’s 2-factor authentication
- eduroam secure wireless - available at UCSC and at many other universities worldwide!
- Encryption tools - for encrypting stored information
- Checklist for lost/stolen mobile devices
- Microsoft Password Strength Checker
- Password managers (See Sec. III.5) - for secure password storage
- Free digital certificates - for UCSC service providers who run web servers
- Secure data disposal - for University devices and electronic media containing restricted data
Restricted data is any confidential or personal information that is protected by law or policy and that requires the highest level of access control and security protection, whether in storage or in transit.
- Practices for Protecting Restricted Data
- Personal Identity Information (PII)
- Personal Identity Information (PII) Training
- Restricted Data Resources