Remote Resources

To help assist employees and students during COVID-19, the following resources are available to the campus community. 

Campus

Employees

Instructors

Students

Virtual Support

Walk-in support at Kerr Hall Rm 54 is closed, however you can still reach technicians for virtual technical support M-F, 8AM to 5PM:

  • Online: https://itrequest.ucsc.edu
  • Email: help@ucsc.edu
  • Phone: (831) 459-HELP (4357)

Getting Started with Zoom

SIGN IN to Zoom with your CruzID/Gold credentials

Keep Zoom Private

Zoom is configured by default to help reduce the possibility of unknown or unwelcome guests joining a meeting or webinar like masking phone numbers and encrypting every session. However, there are additional steps you can take to ensure your Zoom sessions are private. Keep Zoom Private

Connecting to the UCSC Network

The UCSC Virtual Private Network (VPN) provides a secure connection to the campus network when you are working elsewhere.

  • Required: When accessing sensitive university data (P3 - P4) or campus services that contain private, sensitive or financial information. For accessing all Library eResources (eBooks, online journals, Library databases).
  • Highly Recommended: When you are on an unsecured wireless network (e.g., coffee shops, airports). Never work with private, sensitive, or financial information while on unsecured WiFi. When accessing or working with university data (P1 - P2) from a secure network, such as your home Internet connection with password protected wireless.
  • Not Required: Routine email reading and responding. Accessing university public websites.

Instructional Computer Labs and Stations

Instructional computer labs and computing stations are closed.  

Virtual Security Events

If you would like to host an individual virtual Information Security session with your department or workgroup, please email itpolicy@ucsc.edu.

Stay Secure Remotely

As our work and learning go remote, we all need to be hyper-vigilant about good cyber hygiene practices. Here are some critical steps that all of us can take to protect our online safety and security.