How to Stay Secure
Computing is an essential part of our day-to-day existence. By becoming aware of possible threats and vulnerabilities, you can help protect UC Santa Cruz and yourself.
Meet UC Security Requirements
UC has Minimum Security Standards for all users and devices that access UC data or resources. Devices that don't meet these standards may be disconnected from the campus network. To meet UC security requirements, be sure to:
- Use eduroam for secure wireless access on campus.
- Use the campus virtual private network (VPN) with public wireless.
- Encrypt your device* to protect data stored on your computer.
- Update your operating system and software.*
- Install anti-malware software to prevent the installation of malicious software.
- Turn on your firewall* to protect against hackers.
*Using centrally managed computer services will meet this requirement. For computers managed within Academic Divisions, contact your Divisional Liaison.
Make Secure Choices
Human behavior plays a significant role in staying secure. Take the following actions to stay secure:
- Protect Passwords by using two-step verification and a password manager.
- Beware of scams, and only click on links you trust.
- Secure P3-P4 data.
- Lock Your Screen and mobile devices.
- Secure laptops and mobile devices.
- Back up important files and data.
Stay Aware
- Learn about preventing emails from looking phishy.
- Learn about UC Cybersecurity Awareness Month (UCCAM).
- Learn how to prevent identity theft.
- Learn how to avoid data security breaches.
- Learn how to prevent and respond to doxing.
- Learn about UC International Travel Security Guidelines.
Get Help
- If you need assistance with IT security, contact the ITS Support Center.
- To report a security incident, visit UCSC’s Report a Security Incident page.