How to Stay Secure
|The information provided here is designed to help protect your computer, yourself, and the campus from security attacks.|
It's important to understand UCSC's Minimum Network Connectivity Requirements because devices that don't meet these requirements must not be connected to the campus network.
- Install Operating System and Software Updates
- Use Malicious Software Protection (e.g. Anti-Virus)
- Turn On Your Computer's Firewall
- Protect Passwords
- Send Passwords and Restricted Data Securely
- Physical Security is Important, Too
- Lock Your Computer Screen
- Turn Off Unnecessary Services
- No Open Email Relays or Unauthorized Proxy Servers
- Security Audit Agents
Additional information to help keep your computer and data safe and secure.
- Protect Information when using the Internet and email
- Beware of Scams
- Prevent Identity Theft
- Mobile Devices and Wireless
- Don't Download Unknown or Unsolicited Programs or Files
- Back Up Important Files
- Stay Secure with Google
- Practices for Protecting Restricted Data
- Personal Identity Information (PII)
- Personal Identity Information (PII) Training
- Restricted Data Resources
Following are some security-related tools and resources available to everyone in the UCSC community.
- Google’s 2-factor authentication
- eduroam secure wireless - available at UCSC and at many other universities worldwide!
- Encryption tools - for encrypting stored information
- Checklist for lost/stolen mobile devices plus prevention tips
- Microsoft Password Strength Checker
- Password managers (See Sec. III.5) - for secure password storage
- Free digital certificates - for UCSC service providers who run web servers