Expand | ||
---|---|---|
| ||
|
Expand | ||
---|---|---|
| ||
In addition to the security tips outlined above, Faculty and Staff:
|
Expand | ||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||||||||||||||||||||||||||||
|
Expand | ||
---|---|---|
| ||
Windows
Mac OS/X Other
|
Security and Awareness Training
Expand | ||
---|---|---|
| ||
What is Phishing? How do you avoid phishing attempts? |
Expand | ||
---|---|---|
| ||
Protect your valuable work, music, photos & other digital information by making an electronic copy & storing it safely. If you have a copy of your data and your device falls victim to ransomware or other cyber threats, you will be able to restore the data from a backup. Back up your data regularly, and make sure your anti-virus software is always up to date. Several options are available for backing up your data, including:
|
Expand | ||
---|---|---|
| ||
Be conscientious of what you plug into your computer. Malware can be spread through infected flash drives, external hard drives, and even smartphones. |
Expand | ||
---|---|---|
| ||
Always be careful when clicking on attachments or links in emails. If it’s unexpected or suspicious for any reason, don’t click on it. Double-check the URL of the website the link takes you to bad actors who will often take advantage of spelling mistakes to direct you to a harmful domain. When in doubt, forward the message to phish@appstate.edu. |
Expand | ||
---|---|---|
| ||
Keep all software on internet-connected devices (including personal computers, smartphones & tablets) current to reduce the risk of infection from ransomware and malware. Why is updated software important? Why is preventing malware important? How do you keep software up to date? |
Expand | ||
---|---|---|
| ||
Be sure to monitor your accounts, both financial and social, for any suspicious activity. If you see something unfamiliar, it could be a sign that you’ve been compromised. |
Expand | ||
---|---|---|
| ||
Never leave your devices unattended. If you need to leave your computer, phone, or tablet for any length of time (no matter how short) lock it up so no one can use it while you’re gone. |
Expand | ||
---|---|---|
| ||
Information about you, such as purchase history or location, has value (just like money). Be thoughtful about who gets that information and how it is collected by apps, websites, and all connected devices. Set the privacy and security settings on websites to your comfort level for information sharing. It is OK to limit how and with whom you share information. Share With Care |
Expand | ||
---|---|---|
| ||
Practice good password management. Use a strong mix of characters, and don’t use the same password for multiple sites. Don’t share your password with others, don’t write it down, and definitely don’t write it on a post-it note attached to your monitor. |
Expand | ||
---|---|---|
| ||
Why should you secure your mobile devices? How do you secure your mobile devices? |
Expand | ||
---|---|---|
| ||
Sensitive browsing, such as banking or shopping, should only be done on a device that belongs to you, on a network that you trust. Whether it’s a friend’s phone, a public computer, or a café’s free WiFi, your data could be copied or stolen. |
Expand | ||
---|---|---|
| ||
Why use security tools? How do security checkups work? |
Expand | ||
---|---|---|
| ||
Why are unique passwords important? What makes for a strong password? How do you manage better and unique passwords? |
Expand | ||
---|---|---|
| ||
Realize that you are an attractive target to hackers. Don’t ever say, “It won’t happen to me.” You may not realize it, but you are a target for cybercriminals. Your computer, your mobile devices, your accounts, and your information all have tremendous value to cybercriminals around the world. |
Expand | ||
---|---|---|
| ||
|
Expand | ||
---|---|---|
| ||
For policies, standards, guidelines & tips see our security.appstate.edu |