Be Secure

Be Safe, Be Smart, Be Secure

Keeping your computer or other networked devices secure will help protect your personal information from online threats. Taking steps to secure your device is required by the campus - read Berkeley's Minimum Security Requirements for Networked Devices policy.

Keep your system up-to-date to stay ahead of hackers.

A weak password is what hackers look for first. Stay one step ahead.

Learn the remote proctoring policies for Summer Sessions 2020 and Fall Semester 2020.

The bSecure Remote Access VPN (Virtual Private Network) service allows students to securely access the UC Berkeley network from outside of campus as if they were on campus and encrypts the information sent through the network.

Enroll in CalNet 2-Step Verification to secure your device.

Protect your device by downloading antivirus software & being cautious with web browsing. 

Guard against dangerous network traffic. Turn on your firewall.

Read about how your data is collected, used, and analyized through bCourses.

Security FAQs

Why is security so important? What are the minimum security standards?

We place such an emphasis on security to provide the best Internet experience to all students on the network. When one computer has security problems, it can affect the usage of others on the same network. In addition, the University's network infrastructure is an enormous hub for a great deal of traffic in California, and therefore we must maintain the integrity of the devices connected. The minimum security standards include having an antivirus program, a firewall, the latest operating system updates, and passwords for all administrator accounts.

How can I protect my laptop from physical theft and myself from identity theft?

To protect yourself from identity theft, make sure that you have a strong password that is difficult to guess. Be sure to never include any publicly available information in your password, such as your name, your birthday, or your address. Also, only install programs from sources that you trust and be wary of fake sites that ask for your personal information. To protect your computer from physical theft, you can use a computer lock (usually priced between $5 and $30). Attach the lock to a heavy, solid object (such as a desk) and connect the other end to your laptop. You can also buy laptop tracking software, which sends out a beacon through the Internet to help you find it in the event of a theft.

What does it mean to have my Internet shut off for a "security vulnerability"?

The campus systems and network security team continuously scans for security vulnerabilities on the network, such as default passwords, unprotected network shares, and missing Windows or Mac OS X patches. The reason for these stringent security scans is the same as above: we want to protect you against a possible route of infection in order to prevent information/identity theft and to preserve the integrity of our network. After all, the easiest way into the UC Berkeley network is through an unsecured computer.

What can I do to remove malware on my own?

A countermeasure you can take against malware is to use trusted malware removal tools. Some examples include Ad-Aware, Malwarebytes Anti-Malware, and Spybot-Search and Destroy. Make sure you are using a trusted tool, since there are many malicious programs that will only damage your computer further under the guise of being a legitimate malware removal tool.