Skip to content

Connect Securely: 2018 National Cyber Security Awareness Month Toolkit

October 2018

Materials in this toolkit are available to the entire UC community.

For editable files beyond what is available here, please contact your Systemwide Information Security Awareness Workgroup rep(s), listed to the left. If your location isn't listed, please email BOTH Julie Goldstein AND Kamika Hughes at and

| Posters | Video | FAQ |


Click on thumbnail for full size flyer.

Poster thumbnail: Connect securely. Click for PDF.

Be Safe on Wi-Fi

Poster thumbnail: Wi-Fi security tips. Click for PDF.

Wi-Fi Security Tips

Video short:

"Be Safe on Wi-Fi" - Created by UCSB. Mirrors the tips on the penguin/shark poster. (0:50 sec)

FAQ for Connecting to the Internet Securely:

  1. How do I connect securely when I’m on campus?
    1. If you have the option, connect to a wired port on campus. If you have to use wireless, make sure you are connected to your campus’ encrypted wireless network or to eduroam, which is also secure and encrypted.
    2. Contact your IT department if you’re not sure of the exact name of the encrypted wireless network you should use on campus. Look-alike imposter networks can harm your device and sometimes even see everything you’re doing online, so always ask if you’re not positive.
  2. How do I connect securely when I’m off campus?
    1. If you must use a public network, use a virtual private network (VPN) if you have one. This will encrypt your connection to provide a basic level of security. Please see question #4 for more information about VPNs.
    2. Confirm websites are encrypted by making sure that the URL starts with https, not http. The “s” stands for “secure”.
    3. Many universities worldwide have eduroam, not just UC. Eduroam is secure and encrypted, so if you’re ever visiting another campus, check for eduroam before connecting to the guest or public wireless.
    4. If your device has a cellular data plan, using your cellular data is generally more secure than using a public wireless network. Similarly, your own mobile network connection, also known as your wireless hotspot, is generally more secure than using a public wireless network. Use these features if they’re included in your mobile plan.
  3. What actions can I take to be less vulnerable/less prone to attacks when I’m online?
    1. Make sure all your devices are up-to-date with the most current patches/updates. Enable automated software updates whenever possible, and restart your devices periodically. Having the latest updates is one of the best defenses against viruses, malware, and other online threats. If any of your devices are managed for you, contact your IT department to see if there is anything you should do to make your device safer.
    2. Choose passwords that are long and strong, use different passwords for different accounts, and never share your passwords.
    3. Disable auto-connect features and always log out. This prevents your devices from automatically connecting to unknown networks that may have malicious intentions.
    4. Don’t click on unknown links or download unknown files or apps. These can harm your devices and put your information at risk.
    5. Don’t do anything on a public/shared computer or device (e.g., library computers, kiosks, borrowed devices) that requires you to log in or send sensitive information.
    6. Similarly, avoid doing anything sensitive over public networks. Examples include online shopping, banking, medical, sending forms or documents with personal information, etc.
  4. What is a VPN and when should I use it?
    1. “VPN” stands for “virtual private network”. A virtual private network protects your data by creating an encrypted connection between your device and a VPN server. It will also mask your identity because your transmissions appear to come from the VPN server, instead of having a direct link to your computer.
    2. Use a VPN when you connect to Public Wi-Fi or public Internet to secure your data and connections.
    3. See if your campus provides a VPN that you can use. Your IT Department may also have VPN recommendations for your personal use.

Copyright © Regents of the University of California | Terms of use