When working remotely, it is important to keep your devices up to date and follow best practices to ensure you are able to work effectively. Please communicate with your units (schools, colleges, divisions, departments, etc.) about any unit-specific guidelines they may have for working remotely. If you are returning to campus after time away from your devices and technology, please review our campus technology readiness webpage.
Use a UWM-issued laptop
A UWM-issued laptop is the recommended option for working remotely and accessing UWM resources. When logging into your device each day, also be sure to connect to the Virtual Private Network (VPN). The VPN affords several benefits to UWM employees that are working remotely:
- Access your on-campus device
- Off-campus access to UWM’s network drives
- Allows regular updates to run on your device
Remote Desktop
You may be able to use a personal computer to connect remotely to your UWM computer that is physically located on-campus. Using Remote Desktop allows you to access your files and software just like when you are on campus.
- Connect to the Virtual Private Network (VPN)
- Remotely connect to a Windows PC on campus
- Remotely connect to a Mac on campus
Using a Personal Computer
If you lack access to a UWM-issued laptop, you can use a personal computer to perform many work-related tasks such as accessing your email through Microsoft 365 (M365) and viewing or editing documents through Teams, OneDrive, etc.
- Install Microsoft 365 Apps
- Install Adobe Creative Cloud Apps
- You may need to connect to the Virtual Private Network (VPN) to access some resources such as network stored files.
Please note: UWM files should not be stored on personal computing devices.
Best Practices
To help work remotely in a secure manner, please keep these best practices in mind:
- Password and account credential sharing is strictly prohibited, including sharing with other members of your household. All passwords and login information for devices and system logins are required to be kept private.
- Lock device screens when not in use and keep devices secure from theft by not leaving them unattended in public areas.
- Be aware of phishing emails. Many online threats come from phishing or online scams, urging you to click a button or follow a link and reveal sensitive information.
- Report any loss of device, suspected compromised account or other suspicious activity with UWM’s Cybersecurity Incident Report.
Getting Help
If you need support to help you work remotely, please contact the UWM Help Desk.