Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Expand
titleAdditional Security Awareness Tips and Guidelines for Faculty and Staff

In addition to the security tips outlined above, Faculty and Staff:

  • Keep your office computer on 1 night during the week to get IT updates.
  • Lock your computer when you step away.
  • Know ourGuidelines for Storing & Sharing University Information
  • Use uDesk -- a remote virtual Windows desktop that runs on your computer -- when appropriate.  If you visit a site with malware in uDesk, your computer won't be infected.
  • Back up your files to uStor P: drive.
  • Use a secure wireless connection - Use "asu" secure wireless network, or use ASU VPN when you connect to public wireless.

Security and Awareness Training

  • Remote Access Tools
  • Expand
    titleCampus Security Tools
    Expand
    title
    Data Encryption
    Expand
    titleDefining Data Encryption?

    Data encryption is a method that can allow you to safeguard electronic information by preventing unauthorized access to files. Encryption software converts "plain text" data that can easily be read into encrypted data via complex mathematical operations and a unique key. Encryption keys work similarly to physical keys to doors or a locked filing cabinet. Without the key, gaining access to encrypted data is often extremely difficult. Most often encryption keys take the form of passphrases where only individuals who have the passphrase can unencrypt and view the data.

    Expand
    titleIssues Related to Data Encryption

    Access to encrypted data is dependent on your key (see above), making it possible that if you lose your key you may lose access to your data. It is very important to consider how you might securely back up and protect your encryption key when considering encryption.

    Expand
    titleReasons for Using Data Encryption

    Most often when a computing device is lost or stolen, the data on the device is unencrypted and therefore easy to access (even if the device is password protected). However, using encryption protects sensitive data and keeps it private. 

    Another common use of encryption is in creating encrypted containers (more below) so that even if a computer is infected with malware there is an additional layer of protection that may thwart intruders from accessing confidential or sensitive data.

    Expand
    titleDifferent Data Encryption Methods

    Full Disk Encryption is used to safeguard all data stored on a hard drive (including the operating system). 

    File Level Encryption uses a single key or multiple keys to encrypt a single file or series of files only.

    Container-Based Encryption provides encryption of a container file that internally contains other files that can be read (i.e. encrypted zip file).

    Expand
    titleHow to Encrypt Your Files

    Full Disk Encryption is used to safeguard all data stored on a hard drive (including the operating system). 

    File Level Encryption uses a single key or multiple keys to encrypt a single file or series of files only.

    Container-Based Encryption provides encryption of a container file that internally contains other files that can be read (i.e. encrypted zip file).

    Expand
    titleEncrypting Personal Devices
    Note
    titleCreating and Managing Passwords

    Your data encryption protection is only as secure as your encryption key. Use App State’s Tips for Creating a Secure Password. Also, consider using a password manager tool such as KeePass which securely stores passwords.

  • Spirion
  • Secure File Exchange (FileShare)
  • Expand
    titleSecurity Resources

    Windows

    Mac OS/X

    Other

    Security and Awareness Training

    ...

    titleAvoid Phishing Attempts

    ...

    How do you avoid phishing attempts?
    Phishing attempts can often get through spam filters and security software that you may already have in place, so stay vigilant and trust your instincts. Keep an eye out for things like unexpected urgency or a wrong salutation. Think twice about clicking a link or opening a document that seems suspicious. Double-check that every URL where you enter your password looks legitimate. And if anything raises doubt, report the communication to phish@appstate.edu.

    Avoid Phishing Attempts

    What is Phishing?
    "Phishing" refers to the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. These attempts by cybercriminals, nation states, or hacktivists to lure you into giving away personal information, to gain access to accounts, or to infect your machine with malware & viruses are a form of social engineering.  Like all universities, Appalachian State University is frequently phished for account credentials. Phishing attempts can happen through a variety of channels, including email, social media, or text messages, and can compromise security and lead to the theft of personal and financial data. Highly targeted attacks on groups or individuals are known as “spear phishing.”

    What tactics are used in phishing attempts?
    Phishing messages can come from hijacked accounts of people you know, making them hard to distinguish from real messages. Additionally, cybercriminals commonly use infected documents or PDF attachments as vectors for their phishing attempts. Another common trick attackers use is trying to get victims to sign in on a fake login page where their usernames and passwords can be stolen.

    How do you avoid phishing attempts?
    Phishing attempts can often get through spam filters and security software that you may already have in place, so stay vigilant and trust your instincts. Keep an eye out for things like unexpected urgency or a wrong salutation. Think twice about clicking a link or opening a document that seems suspicious. Double-check that every URL where you enter your password looks legitimate. And if anything raises doubt, report the communication to phish@appstate.edu.


    Expand
    titleInternal Phishing Program

    As part of our ongoing efforts to help defend App State from increasing cybersecurity threats, ITS will be sending out test phishing emails. These internal phishing messages are learning opportunities and employees will not be punished for falling victim to a test phishing attack.

    These test phishing messages will simulate real-world attacks that are often observed in our security monitoring practices. These test messages will be sent out at random intervals throughout the year.

    Key Takeaways:

    • Phishing test messages will simulate real-world phishing attempts, starting with easily identifiable phishing scenarios and progressing to more advanced scenarios as employees improve their responses.
    • Employees who receive suspicious emails should forward them to phish@appstate.edu, regardless of if they think it is part of the test or not.
    • The results of these phishing tests are only visible to the ITS Office of Information Security.  
    • Reporting on these tests will be anonymous.
    • If you click on a link in one of these messages, you will receive information to help spot and avoid similar phishing messages in the future.  Employees who fall for a phishing attempt will be redirected to an educational webpage comprised of phishing information and training opportunities, including the identification of specific elements within the message that would help to distinguish it as fraudulent.
    • Our goal is to increase employee security awareness and decrease the number of employees who click on malicious emails.

    With all suspicious emails, remember these helpful steps:

    1. Look at the sender's email - is it an App State email?  Is this someone you know?
    2. Are they asking for personal information?  Or for you to download an attachment?
    3. Don't click on links if the email seems suspicious or unusual.
    4. You can help us to identify suspicious emails by forwarding them to phish@appstate.edu.

    A Few Important Things to Remember

    • Always remember that ITS will never ask you to provide your password either via the phone, email, or other communications.
    • Keep in mind that phishing emails can look very legitimate and include the same images, logos, and text associated with the organizations they are attempting to masquerade as. Don't take the appearance of an email or website as a mark of legitimacy. 
    • Be aware that the 'From' field in email messages can easily be fabricated. Don't assume that an email is legitimate based on the apparent sender in the "From" field. 

    Employees are strongly encouraged to treat all suspicious emails as potentially dangerous.  While these simulated messages are not malicious, real phishing attacks pose a great threat to our university community. 

    Addition Resources

    Phishing Examples:

    Common Security Threats

    Videos:

    Online Quizzes:


    Expand
    titleBack-Up Your Data

    Protect your valuable work, music, photos & other digital information by making an electronic copy & storing it safely. If you have a copy of your data and your device falls victim to ransomware or other cyber threats, you will be able to restore the data from a backup.

    Back up your data regularly, and make sure your anti-virus software is always up to date. Several options are available for backing up your data, including:

    • Back-Up To an External Drive
    • Back-Up Over the Internet
    • Use a Cloud Storage Service


    Expand
    titleBe Careful of What You Plug Into Your Computer

    Be conscientious of what you plug into your computer. Malware can be spread through infected flash drives, external hard drives, and even smartphones.


    Expand
    titleBe Careful When Clicking on Links in Email

    Always be careful when clicking on attachments or links in emails. If it’s unexpected or suspicious for any reason, don’t click on it. Double-check the URL of the website the link takes you to bad actors who will often take advantage of spelling mistakes to direct you to a harmful domain. When in doubt, forward the message to phish@appstate.edu.


    Expand
    titleKeep a Clean Machine

    Keep all software on internet-connected devices (including personal computers, smartphones & tablets) current to reduce the risk of infection from ransomware and malware.

    Why is updated software important?
    Running out-of-date software can put you at risk of security vulnerabilities that hackers seek out & exploit. Security experts agree that keeping your software - including Internet browsers, operating systems, plugins & document editors - up-to-date on internet-connected devices is fundamental cybersecurity practice & helps prevent malware infections that could compromise your devices & accounts.

    Why is preventing malware important?
    Malware can take many forms, including capturing keystrokes and passwords when they are entered, ransomware, which can encrypt files and demand payment to release them, and using devices to send out spam or participate in a distributed denial of service (DDoS) attack. If your device is infected, sharing files may also infect others.

    How do you keep software up to date?
    When you receive a notification that a software update is available, install it as soon as possible. Knowing your programs and operating system is important. Some programs, like reputable antivirus/security software and some web browsers, including Chrome, automatically update. Mobile operating systems, apps, and other critical software may require your action to update.


    Expand
    titleMonitor Your Accounts

    Be sure to monitor your accounts, both financial and social, for any suspicious activity. If you see something unfamiliar, it could be a sign that you’ve been compromised.


    Expand
    titleNever Leave Your Devices Unattended

    Never leave your devices unattended. If you need to leave your computer, phone, or tablet for any length of time (no matter how short) lock it up so no one can use it while you’re gone.


    Expand
    titleOwn Your Online Presence

    Information about you, such as purchase history or location, has value (just like money). Be thoughtful about who gets that information and how it is collected by apps, websites, and all connected devices. Set the privacy and security settings on websites to your comfort level for information sharing. It is OK to limit how and with whom you share information.

    Share With Care
    Think before posting about yourself and others online. Consider what a post reveals, who might see it, and how it might affect you and others.


    Expand
    titlePractice Good Password Management

    Practice good password management. Use a strong mix of characters, and don’t use the same password for multiple sites. Don’t share your password with others, don’t write it down, and definitely don’t write it on a post-it note attached to your monitor.


    Expand
    titleProtect Mobile Devices

    Why should you secure your mobile devices?
    Mobile phones & tablets contain a wealth of personal data, including emails, contacts, schedules, locations, and direct access to apps. When your mobile device is lost or stolen, your data goes with it, making any information contained on the device vulnerable.

    How do you secure your mobile devices?
    The first layer of mobile security is locking your device with a passcode, Touch ID features, or other biometrics. In case your phone is ever lost or stolen, make sure you’re aware of the different offerings that exist to help you remotely locate or lock your device, or wipe data from it. Some of these features may be built in by the operating system or carrier (They may albo be available via an app.) Your systems administrator might also have specific rules to follow if you lose a work device.


    Expand
    titleUse Caution with Sensitive Browsing

    Sensitive browsing, such as banking or shopping, should only be done on a device that belongs to you, on a network that you trust. Whether it’s a friend’s phone, a public computer, or a café’s free WiFi, your data could be copied or stolen.


    Expand
    titleUse Trusted Security Tools

    Why use security tools?
    Many online service providers offer useful settings and tools to help you manage your online presence, keep your data secure, and get the most out of the services you use. For example, strong authentication is rarely turned on by default but is offered by many online services for users that want an extra layer of protection on their account.

    How do security checkups work?
    Guided security checkups help you understand the security settings available, and give you confidence that you are using the strongest options available. And managing your notification settings, including alerts when your location is being used or when new information about you or a new photo is posted online, can help you manage your online presence.


    Expand
    titleUse Unique Passwords

    Why are unique passwords important?
    Password reuse for multiple accounts is one of the most common ways accounts are hijacked. When passwords are reused, having your credentials stolen for one account means hackers gain access to other accounts that use the same login details.

    What makes for a strong password?
    In addition to being unique, security experts agree that a strong password is at least 12 characters long, and contains a mix of letters, numbers, and symbols. Maintaining strong and unique passwords will decrease the risk of password guessing based on commonly used passwords, information about you that might be publicly available, or password-cracking tools that hackers use.

    How do you manage better and unique passwords?
    It is really hard to remember a lot of strong and unique passwords. Thankfully, there are a lot of tools out there to help. Using a password manager only requires you to remember one master password to access your other passwords. If needed, you can write passwords down on a piece of paper and store them in a secure location away from your computer, but be careful not to store passwords right on your computer.


    Expand
    titleYou are a Target

    Realize that you are an attractive target to hackers. Don’t ever say, “It won’t happen to me.” You may not realize it, but you are a target for cybercriminals. Your computer, your mobile devices, your accounts, and your information all have tremendous value to cybercriminals around the world.



    Expand
    titleReporting Security Awareness Concern

    For policies, standards, guidelines & tips see our security.appstate.edu
    To get help with your personal devices at our Technology Support Center 
    You can enter a support ticket at support.appstate.edu
    If you have any information security concerns or questions you can email support@appstate.edu,  contact your ITS Consultant, call the ITS Support Help Desk at (828) 262-6266, or visit the Technology Support Center in Room 140 of Anne Belk Hall (Exterior entrance located directly across from Rankin Science)


    Content by Label
    showLabelsfalse
    max50
    showSpacefalse
    sorttitle
    excludeCurrenttrue
    cqllabel in ("security","spirion","encryption","remote","remote-work","security-awareness","securityawareness","udesk-virtual-desktops") and space = "ATKB"


    We value your feedback! Click HERE to suggest updates to an existing article, request a new article, or submit an idea.

    Search Knowledge Base

    Submit a Service Request

    Expand
    titleInternal Phishing Program

    As part of our ongoing efforts to help defend App State from increasing cybersecurity threats, ITS will be sending out test phishing emails. These internal phishing messages are learning opportunities and employees will not be punished for falling victim to a test phishing attack.

    These test phishing messages will simulate real-world attacks that are often observed in our security monitoring practices. These test messages will be sent out at random intervals throughout the year.

    Key Takeaways:

    • Phishing test messages will simulate real-world phishing attempts, starting with easily identifiable phishing scenarios and progressing to more advanced scenarios as employees improve their responses.
    • Employees who receive suspicious emails should forward them to phish@appstate.edu, regardless of if they think it is part of the test or not.
    • The results of these phishing tests are only visible to the ITS Office of Information Security.  
    • Reporting on these tests will be anonymous.
    • If you click on a link in one of these messages, you will receive information to help spot and avoid similar phishing messages in the future.  Employees who fall for a phishing attempt will be redirected to an educational webpage comprised of phishing information and training opportunities, including the identification of specific elements within the message that would help to distinguish it as fraudulent.
    • Our goal is to increase employee security awareness and decrease the number of employees who click on malicious emails.

    With all suspicious emails, remember these helpful steps:

    1. Look at the sender's email - is it an App State email?  Is this someone you know?
    2. Are they asking for personal information?  Or for you to download an attachment?
    3. Don't click on links if the email seems suspicious or unusual.
    4. You can help us to identify suspicious emails by forwarding them to phish@appstate.edu.

    A Few Important Things to Remember

    • Always remember that ITS will never ask you to provide your password either via the phone, email, or other communications.
    • Keep in mind that phishing emails can look very legitimate and include the same images, logos, and text associated with the organizations they are attempting to masquerade as. Don't take the appearance of an email or website as a mark of legitimacy. 
    • Be aware that the 'From' field in email messages can easily be fabricated. Don't assume that an email is legitimate based on the apparent sender in the "From" field. 

    Employees are strongly encouraged to treat all suspicious emails as potentially dangerous.  While these simulated messages are not malicious, real phishing attacks pose a great threat to our university community. 

    Addition Resources

    Phishing Examples:

    Common Security Threats

    Videos:

    Online Quizzes:

    Expand
    titleBack-Up Your Data

    Protect your valuable work, music, photos & other digital information by making an electronic copy & storing it safely. If you have a copy of your data and your device falls victim to ransomware or other cyber threats, you will be able to restore the data from a backup.

    Back up your data regularly, and make sure your anti-virus software is always up to date. Several options are available for backing up your data, including:

    • Back-Up To an External Drive
    • Back-Up Over the Internet
    • Use a Cloud Storage Service
    Expand
    titleBe Careful of What You Plug Into Your Computer

    Be conscientious of what you plug into your computer. Malware can be spread through infected flash drives, external hard drives, and even smartphones.

    Expand
    titleBe Careful When Clicking on Links in Email

    Always be careful when clicking on attachments or links in emails. If it’s unexpected or suspicious for any reason, don’t click on it. Double-check the URL of the website the link takes you to bad actors who will often take advantage of spelling mistakes to direct you to a harmful domain. When in doubt, forward the message to phish@appstate.edu.

    Expand
    titleKeep a Clean Machine

    Keep all software on internet-connected devices (including personal computers, smartphones & tablets) current to reduce the risk of infection from ransomware and malware.

    Why is updated software important?
    Running out-of-date software can put you at risk of security vulnerabilities that hackers seek out & exploit. Security experts agree that keeping your software - including Internet browsers, operating systems, plugins & document editors - up-to-date on internet-connected devices is fundamental cybersecurity practice & helps prevent malware infections that could compromise your devices & accounts.

    Why is preventing malware important?
    Malware can take many forms, including capturing keystrokes and passwords when they are entered, ransomware, which can encrypt files and demand payment to release them, and using devices to send out spam or participate in a distributed denial of service (DDoS) attack. If your device is infected, sharing files may also infect others.

    How do you keep software up to date?
    When you receive a notification that a software update is available, install it as soon as possible. Knowing your programs and operating system is important. Some programs, like reputable antivirus/security software and some web browsers, including Chrome, automatically update. Mobile operating systems, apps, and other critical software may require your action to update.

    Expand
    titleMonitor Your Accounts

    Be sure to monitor your accounts, both financial and social, for any suspicious activity. If you see something unfamiliar, it could be a sign that you’ve been compromised.

    Expand
    titleNever Leave Your Devices Unattended

    Never leave your devices unattended. If you need to leave your computer, phone, or tablet for any length of time (no matter how short) lock it up so no one can use it while you’re gone.

    Expand
    titleOwn Your Online Presence

    Information about you, such as purchase history or location, has value (just like money). Be thoughtful about who gets that information and how it is collected by apps, websites, and all connected devices. Set the privacy and security settings on websites to your comfort level for information sharing. It is OK to limit how and with whom you share information.

    Share With Care
    Think before posting about yourself and others online. Consider what a post reveals, who might see it, and how it might affect you and others.

    Expand
    titlePractice Good Password Management

    Practice good password management. Use a strong mix of characters, and don’t use the same password for multiple sites. Don’t share your password with others, don’t write it down, and definitely don’t write it on a post-it note attached to your monitor.

    Expand
    titleProtect Mobile Devices

    Why should you secure your mobile devices?
    Mobile phones & tablets contain a wealth of personal data, including emails, contacts, schedules, locations, and direct access to apps. When your mobile device is lost or stolen, your data goes with it, making any information contained on the device vulnerable.

    How do you secure your mobile devices?
    The first layer of mobile security is locking your device with a passcode, Touch ID features, or other biometrics. In case your phone is ever lost or stolen, make sure you’re aware of the different offerings that exist to help you remotely locate or lock your device, or wipe data from it. Some of these features may be built in by the operating system or carrier (They may albo be available via an app.) Your systems administrator might also have specific rules to follow if you lose a work device.

    Expand
    titleUse Caution with Sensitive Browsing

    Sensitive browsing, such as banking or shopping, should only be done on a device that belongs to you, on a network that you trust. Whether it’s a friend’s phone, a public computer, or a café’s free WiFi, your data could be copied or stolen.

    Expand
    titleUse Trusted Security Tools

    Why use security tools?
    Many online service providers offer useful settings and tools to help you manage your online presence, keep your data secure, and get the most out of the services you use. For example, strong authentication is rarely turned on by default but is offered by many online services for users that want an extra layer of protection on their account.

    How do security checkups work?
    Guided security checkups help you understand the security settings available, and give you confidence that you are using the strongest options available. And managing your notification settings, including alerts when your location is being used or when new information about you or a new photo is posted online, can help you manage your online presence.

    Expand
    titleUse Unique Passwords

    Why are unique passwords important?
    Password reuse for multiple accounts is one of the most common ways accounts are hijacked. When passwords are reused, having your credentials stolen for one account means hackers gain access to other accounts that use the same login details.

    What makes for a strong password?
    In addition to being unique, security experts agree that a strong password is at least 12 characters long, and contains a mix of letters, numbers, and symbols. Maintaining strong and unique passwords will decrease the risk of password guessing based on commonly used passwords, information about you that might be publicly available, or password-cracking tools that hackers use.

    How do you manage better and unique passwords?
    It is really hard to remember a lot of strong and unique passwords. Thankfully, there are a lot of tools out there to help. Using a password manager only requires you to remember one master password to access your other passwords. If needed, you can write passwords down on a piece of paper and store them in a secure location away from your computer, but be careful not to store passwords right on your computer.

    Expand
    titleYou are a Target

    Realize that you are an attractive target to hackers. Don’t ever say, “It won’t happen to me.” You may not realize it, but you are a target for cybercriminals. Your computer, your mobile devices, your accounts, and your information all have tremendous value to cybercriminals around the world.

    Expand
    titleTraining and Awareness Resources

    ...

    titleReporting Security Awareness Concern

    ...