Remote Resources
To help assist employees and students who work, teach and learn remotely, the following resources are available.
Employees |
Instructors |
Students |
Virtual Support
You can reach technicians for virtual technical support M-F, 8AM to 5PM:
- Online: https://slughub.ucsc.edu/its
- Email: help@ucsc.edu
- Phone: (831) 459-HELP (4357)
Getting Started with Zoom
SIGN IN to Zoom with your CruzID/Gold credentials
- Zoom Quick Guide
- Zoom FAQs
- Keep Zoom Secure
- Zoom Backgrounds
- Zoom Best Practices
- Zoom Accessibility
- More Zoom Information
Keep Zoom Private
Zoom is configured by default to help reduce the possibility of unknown or unwelcome guests joining a meeting or webinar like masking phone numbers and encrypting every session. However, there are additional steps you can take to ensure your Zoom sessions are private. Keep Zoom Private
Connecting to the UCSC Network
The UCSC Virtual Private Network (VPN) provides a secure connection to the campus network when you are working elsewhere.
- Required: When accessing sensitive university data (P3 - P4) or campus services that contain private, sensitive or financial information. For accessing all Library eResources (eBooks, online journals, Library databases).
- Highly Recommended: When you are on an unsecured wireless network (e.g., coffee shops, airports). Never work with private, sensitive, or financial information while on unsecured WiFi. When accessing or working with university data (P1 - P2) from a secure network, such as your home Internet connection with password protected wireless.
- Not Required: Routine email reading and responding. Accessing university public websites.
Instructional Computer Labs and Stations
Visit the instructional computer labs website for more information.
Virtual Security Events
If you would like to host an individual virtual Information Security session with your department or workgroup, please email ispolicy@ucsc.edu.
Stay Secure Remotely
If you work, teach, or learn remoting, you need to be hyper-vigilant about good cyber hygiene practices. Here are some critical steps that all of us can take to protect our online safety and security.