Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.


Expand
titleSecurity Awareness Tips and Guidelines for Everyone

...

  • Be aware of online scams - don't get lured by phishing!  Report any attempts to get your username, password, or other personal information to phish@appstate.edu. Don't share your password, and never enter your password on a website without making sure you are in the right place. Appalachian ITS will never ask for your password!
  • Use Good Passwords and Keep them Safe: Use passwords with letters, numbers, and symbols - for each account. If you need help remembering your passwords, use a password vault like KeePass. 
  • Review your Social Media Privacy settings - customize your privacy settings and think about what you share.
  • Don't link your social media accounts together - one hacked account gives the hacker access to all linked accounts.
  • Be aware of online scams - don't get lured by phishing!
  • Log Out before you walk away from a public computer - log out of your MountaineerApps account and the public computer.
  • Keep clean machines and back up your files -Make sure your device and software are set to install regular updates and use Antivirus software. Back up your files with an external device and/or Mountaineer Drive.
  • Use https - whenever you transmit confidential information to a website.
  • Be careful where you click:
    • Use official sites like Google Play Store to download apps, and review what they want to access.
    • Don't open questionable email attachments or click on ads on websites.

...


Expand
titleAdditional Security Awareness Tips and Guidelines for

...

Faculty and Staff

In addition to the security tips outlined above, Faculty and Staff:

  • Keep your office computer on 1 night during the week to get IT updates.
  • Lock your computer when you step away.
  • Know ourGuidelines for Storing & Sharing University Information
  • Use uDesk -- a remote virtual Windows desktop that runs on your computer -- when appropriate.  If you visit a site with malware in uDesk, your computer won't be infected.
  • Back up your files to uStor P: drive.
  • Use a secure wireless connection - Use "asu" secure wireless network, or use ASU VPN when you connect to public wireless.
Expand
titleCampus Security Tools
  • Remote Access Tools

  • Expand
    titleData Encryption


    Expand
    titleDefining Data Encryption?

    Data encryption is a method that can allow you to safeguard electronic information by preventing unauthorized access to files. Encryption software converts "plain text" data that can easily be read into encrypted data via complex mathematical operations and a unique key. Encryption keys work similarly to physical keys to doors or a locked filing cabinet. Without the key, gaining access to encrypted data is often extremely difficult. Most often encryption keys take the form of passphrases where only individuals who have the passphrase can unencrypt and view the data.


    Expand
    titleIssues Related to Data Encryption

    Access to encrypted data is dependent on your key (see above), making it possible that if you lose your key you may lose access to your data. It is very important to consider how you might securely back up and protect your encryption key when considering encryption.


    Expand
    titleReasons for Using Data Encryption

    Most often when a computing device is lost or stolen, the data on the device is unencrypted and therefore easy to access (even if the device is password protected). However, using encryption protects sensitive data and keeps it private. 

    Another common use of encryption is in creating encrypted containers (more below) so that even if a computer is infected with malware there is an additional layer of protection that may thwart intruders from accessing confidential or sensitive data.


    Expand
    titleDifferent Data Encryption Methods

    Full Disk Encryption is used to safeguard all data stored on a hard drive (including the operating system). 

    File Level Encryption uses a single key or multiple keys to encrypt a single file or series of files only.

    Container-Based Encryption provides encryption of a container file that internally contains other files that can be read (i.e. encrypted zip file).


    Expand
    titleHow to Encrypt Your Files

    Full Disk Encryption is used to safeguard all data stored on a hard drive (including the operating system). 

    File Level Encryption uses a single key or multiple keys to encrypt a single file or series of files only.

    Container-Based Encryption provides encryption of a container file that internally contains other files that can be read (i.e. encrypted zip file).


    Expand
    titleEncrypting Personal Devices


    Note
    titleCreating and Managing Passwords

    Your data encryption protection is only as secure as your encryption key. Use App State’s Tips for Creating a Secure Password. Also, consider using a password manager tool such as Keepass which securely stores passwords.



  • Spirion
  • Secure File Exchange (FileShare)

...

Expand
titleTraining and Awareness Resources

...


Expand
titleReporting Security Awareness Concern

...

If you ever have information security concerns, contact the ITS Support Help Desk at (828) 262-6266 or email support@appstate.edu  

...

For policies, standards, guidelines & tips see our security.appstate.edu

...


To get help with your personal devices at our Technology Support Center 
You can enter a support ticket at support.appstate.edu

...

If you have any information security concerns or questions you can email support@appstate.edu,  contact your ITS Consultant

...

, call the ITS Support Help Desk at (828) 262-6266

...

...

, or visit the Technology Support Center in Room 140 of Anne Belk Hall (Exterior entrance located directly across from Rankin Science)

...

Questions?  Contact security@appstate.edu

...