How to Stay Secure

Computing is an essential part of our day-to-day existence. By becoming aware of possible threats and vulnerabilities, you help to protect UCSC as well as yourself.
What's Required
UC has Minimum Security Standards for all users and devices that access UC data or resources. Devices that don't meet these standards may be disconnected from the campus network.
Use IT Services to meet these requirements.
- Securely Connect: Use eduroam for secure wireless access on campus
- Play It Safe: Use the campus virtual private network (VPN) with public wireless
- *Encrypt your device: Protect data stored on your computer
- *Apply Updates: Update your operating system and software
- *Get Anti-Malware Software: Prevent malicious software like malware and exploits
- *Turn on Firewall: Protection barrier against hackers
*Using centrally managed Computer Services will meet this requirement. For computers managed within Academic Divisions, contact your Divisional Liaison.
Make Secure Choices
Human behavior plays a significant role in staying secure. Take these actions to make a big impact.
- Protect Passwords: Use two-step verification and a password manager
- Click Wisely: Beware of scams, click on links you trust
- Know Your Data: Make sure to secure P3-P4 data
- Lock Your Screen: Password protect your computer screen and mobile devices
- Physical Security: Secure laptops and mobile devices
- Back It Up: Back up important files and data
Stay Aware
- Be Cyber Strong: Protect yourself against cybercrime
- Don't Get Fooled: Identity theft is a growing threat
Get Help
Contact the ITS Support Center if you need assistance with IT security.