Expand |
---|
title | Security Awareness Tips and Guidelines for Everyone |
---|
|
...
|
- Be aware of online scams - don't get lured by phishing! Report any attempts to get your username, password, or other personal information to phish@appstate.edu. Don't share your password, and never enter your password on a website without making sure you are in the right place. Appalachian ITS will never ask for your password!
- Use Good Passwords and Keep them Safe: Use passwords with letters, numbers, and symbols - for each account. If you need help remembering your passwords, use a password vault like KeePass.
- Review your Social Media Privacy settings - customize your privacy settings and think about what you share.
- Don't link your social media accounts together - one hacked account gives the hacker access to all linked accounts.
- Be aware of online scams - don't get lured by phishing!
- Log Out before you walk away from a public computer - log out of your MountaineerApps account and the public computer.
- Keep clean machines and back up your files -Make sure your device and software are set to install regular updates and use Antivirus software. Back up your files with an external device and/or Mountaineer Drive.
- Use https - whenever you transmit confidential information to a website.
- Be careful where you click:
- Use official sites like Google Play Store to download apps, and review what they want to access.
- Don't open questionable email attachments or click on ads on websites.
|
...
Expand |
---|
title | Additional Security Awareness Tips and Guidelines for |
---|
|
...
|
In addition to the security tips outlined above, Faculty and Staff: - Keep your office computer on 1 night during the week to get IT updates.
- Lock your computer when you step away.
- Know ourGuidelines for Storing & Sharing University Information
- Use uDesk -- a remote virtual Windows desktop that runs on your computer -- when appropriate. If you visit a site with malware in uDesk, your computer won't be infected.
- Back up your files to uStor P: drive.
- Use a secure wireless connection - Use "asu" secure wireless network, or use ASU VPN when you connect to public wireless.
|
Expand |
---|
title | Campus Security Tools |
---|
|
- Remote Access Tools
Expand |
---|
|
Expand |
---|
title | Defining Data Encryption? |
---|
| Data encryption is a method that can allow you to safeguard electronic information by preventing unauthorized access to files. Encryption software converts "plain text" data that can easily be read into encrypted data via complex mathematical operations and a unique key. Encryption keys work similarly to physical keys to doors or a locked filing cabinet. Without the key, gaining access to encrypted data is often extremely difficult. Most often encryption keys take the form of passphrases where only individuals who have the passphrase can unencrypt and view the data. |
Expand |
---|
title | Issues Related to Data Encryption |
---|
| Access to encrypted data is dependent on your key (see above), making it possible that if you lose your key you may lose access to your data. It is very important to consider how you might securely back up and protect your encryption key when considering encryption. |
Expand |
---|
title | Reasons for Using Data Encryption |
---|
| Most often when a computing device is lost or stolen, the data on the device is unencrypted and therefore easy to access (even if the device is password protected). However, using encryption protects sensitive data and keeps it private. Another common use of encryption is in creating encrypted containers (more below) so that even if a computer is infected with malware there is an additional layer of protection that may thwart intruders from accessing confidential or sensitive data. |
Expand |
---|
title | Different Data Encryption Methods |
---|
| Full Disk Encryption is used to safeguard all data stored on a hard drive (including the operating system). File Level Encryption uses a single key or multiple keys to encrypt a single file or series of files only. Container-Based Encryption provides encryption of a container file that internally contains other files that can be read (i.e. encrypted zip file). |
Expand |
---|
title | How to Encrypt Your Files |
---|
| Full Disk Encryption is used to safeguard all data stored on a hard drive (including the operating system). File Level Encryption uses a single key or multiple keys to encrypt a single file or series of files only. Container-Based Encryption provides encryption of a container file that internally contains other files that can be read (i.e. encrypted zip file). |
Expand |
---|
title | Encrypting Personal Devices |
---|
| |
Note |
---|
title | Creating and Managing Passwords |
---|
| Your data encryption protection is only as secure as your encryption key. Use App State’s Tips for Creating a Secure Password. Also, consider using a password manager tool such as Keepass which securely stores passwords. |
|
- Spirion
- Secure File Exchange (FileShare)
|
...
Expand |
---|
title | Training and Awareness Resources |
---|
|
|
...
Expand |
---|
title | Reporting Security Awareness Concern |
---|
|
...
If you ever have information security concerns, contact the ITS Support Help Desk at (828) 262-6266 or email support@appstate.edu
...
|
For policies, standards, guidelines & tips see our security.appstate.edu |
...
To get help with your personal devices at our Technology Support Center You can enter a support ticket at support.appstate.edu
|
...
If you have any information security concerns or questions you can email support@appstate.edu, contact your ITS Consultant |
...
, call the ITS Support Help Desk at (828) 262-6266 |
...
- Get help with your personal devices at our Technology Support Center
...
, or visit the Technology Support Center in Room 140 of Anne Belk Hall (Exterior entrance located directly across from Rankin Science) |
...
Questions? Contact security@appstate.edu
...