...
Expand | ||
---|---|---|
| ||
In addition to the security tips outlined above, Faculty and Staff:
| ||
Expand | ||
|
Security and Awareness Training
Expand | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Data Encryption |
Expand | ||
---|---|---|
| ||
Data encryption is a method that can allow you to safeguard electronic information by preventing unauthorized access to files. Encryption software converts "plain text" data that can easily be read into encrypted data via complex mathematical operations and a unique key. Encryption keys work similarly to physical keys to doors or a locked filing cabinet. Without the key, gaining access to encrypted data is often extremely difficult. Most often encryption keys take the form of passphrases where only individuals who have the passphrase can unencrypt and view the data. |
Expand | ||
---|---|---|
| ||
Access to encrypted data is dependent on your key (see above), making it possible that if you lose your key you may lose access to your data. It is very important to consider how you might securely back up and protect your encryption key when considering encryption. |
Expand | ||
---|---|---|
| ||
Most often when a computing device is lost or stolen, the data on the device is unencrypted and therefore easy to access (even if the device is password protected). However, using encryption protects sensitive data and keeps it private. Another common use of encryption is in creating encrypted containers (more below) so that even if a computer is infected with malware there is an additional layer of protection that may thwart intruders from accessing confidential or sensitive data. |
Expand | ||
---|---|---|
| ||
Full Disk Encryption is used to safeguard all data stored on a hard drive (including the operating system). File Level Encryption uses a single key or multiple keys to encrypt a single file or series of files only. Container-Based Encryption provides encryption of a container file that internally contains other files that can be read (i.e. encrypted zip file). |
Expand | ||
---|---|---|
| ||
Full Disk Encryption is used to safeguard all data stored on a hard drive (including the operating system). File Level Encryption uses a single key or multiple keys to encrypt a single file or series of files only. Container-Based Encryption provides encryption of a container file that internally contains other files that can be read (i.e. encrypted zip file). |
Expand | ||
---|---|---|
| ||
|
Note | ||
---|---|---|
| ||
Your data encryption protection is only as secure as your encryption key. Use App State’s Tips for Creating a Secure Password. Also, consider using a password manager tool such as KeePass which securely stores passwords. |
Expand | ||
---|---|---|
| ||
Windows
Mac OS/X Other
|
Security and Awareness Training
...
title | Avoid Phishing Attempts |
---|
...
How do you avoid phishing attempts?
Phishing attempts can often get through spam filters and security software that you may already have in place, so stay vigilant and trust your instincts. Keep an eye out for things like unexpected urgency or a wrong salutation. Think twice about clicking a link or opening a document that seems suspicious. Double-check that every URL where you enter your password looks legitimate. And if anything raises doubt, report the communication to phish@appstate.edu.
Expand | ||
---|---|---|
| ||
As part of our ongoing efforts to help defend App State from increasing cybersecurity threats, ITS will be sending out test phishing emails. These internal phishing messages are learning opportunities and employees will not be punished for falling victim to a test phishing attack. These test phishing messages will simulate real-world attacks that are often observed in our security monitoring practices. These test messages will be sent out at random intervals throughout the year. Key Takeaways:
With all suspicious emails, remember these helpful steps:
A Few Important Things to Remember
Employees are strongly encouraged to treat all suspicious emails as potentially dangerous. While these simulated messages are not malicious, real phishing attacks pose a great threat to our university community. Addition ResourcesPhishing Examples: Videos: Online Quizzes: |
Expand | ||
---|---|---|
| ||
Protect your valuable work, music, photos & other digital information by making an electronic copy & storing it safely. If you have a copy of your data and your device falls victim to ransomware or other cyber threats, you will be able to restore the data from a backup. Back up your data regularly, and make sure your anti-virus software is always up to date. Several options are available for backing up your data, including:
|
Expand | ||
---|---|---|
| ||
Be conscientious of what you plug into your computer. Malware can be spread through infected flash drives, external hard drives, and even smartphones. |
Expand | ||
---|---|---|
| ||
Always be careful when clicking on attachments or links in emails. If it’s unexpected or suspicious for any reason, don’t click on it. Double-check the URL of the website the link takes you to bad actors who will often take advantage of spelling mistakes to direct you to a harmful domain. When in doubt, forward the message to phish@appstate.edu. |
Expand | ||
---|---|---|
| ||
Keep all software on internet-connected devices (including personal computers, smartphones & tablets) current to reduce the risk of infection from ransomware and malware. Why is updated software important? Why is preventing malware important? How do you keep software up to date? |
Expand | ||
---|---|---|
| ||
Be sure to monitor your accounts, both financial and social, for any suspicious activity. If you see something unfamiliar, it could be a sign that you’ve been compromised. |
Expand | ||
---|---|---|
| ||
Never leave your devices unattended. If you need to leave your computer, phone, or tablet for any length of time (no matter how short) lock it up so no one can use it while you’re gone. |
Expand | ||
---|---|---|
| ||
Information about you, such as purchase history or location, has value (just like money). Be thoughtful about who gets that information and how it is collected by apps, websites, and all connected devices. Set the privacy and security settings on websites to your comfort level for information sharing. It is OK to limit how and with whom you share information. Share With Care |
Expand | ||
---|---|---|
| ||
Practice good password management. Use a strong mix of characters, and don’t use the same password for multiple sites. Don’t share your password with others, don’t write it down, and definitely don’t write it on a post-it note attached to your monitor. |
Expand | ||
---|---|---|
| ||
Why should you secure your mobile devices? How do you secure your mobile devices? |
Expand | ||
---|---|---|
| ||
Sensitive browsing, such as banking or shopping, should only be done on a device that belongs to you, on a network that you trust. Whether it’s a friend’s phone, a public computer, or a café’s free WiFi, your data could be copied or stolen. |
Expand | ||
---|---|---|
| ||
Why use security tools? How do security checkups work? |
Expand | ||
---|---|---|
| ||
Why are unique passwords important? What makes for a strong password? How do you manage better and unique passwords? |
Expand | ||
---|---|---|
| ||
Realize that you are an attractive target to hackers. Don’t ever say, “It won’t happen to me.” You may not realize it, but you are a target for cybercriminals. Your computer, your mobile devices, your accounts, and your information all have tremendous value to cybercriminals around the world. |
Expand | ||
---|---|---|
| ||
|
Expand | ||
---|---|---|
| ||
| ||
What is Phishing? How do you avoid phishing attempts? |
Expand | ||
---|---|---|
| ||
As part of our ongoing efforts to help defend App State from increasing cybersecurity threats, ITS will be sending out test phishing emails. These internal phishing messages are learning opportunities and employees will not be punished for falling victim to a test phishing attack. These test phishing messages will simulate real-world attacks that are often observed in our security monitoring practices. These test messages will be sent out at random intervals throughout the year. Key Takeaways:
With all suspicious emails, remember these helpful steps:
A Few Important Things to Remember
Employees are strongly encouraged to treat all suspicious emails as potentially dangerous. While these simulated messages are not malicious, real phishing attacks pose a great threat to our university community. Addition ResourcesPhishing Examples: Videos: Online Quizzes: |
Expand | ||
---|---|---|
| ||
Protect your valuable work, music, photos & other digital information by making an electronic copy & storing it safely. If you have a copy of your data and your device falls victim to ransomware or other cyber threats, you will be able to restore the data from a backup. Back up your data regularly, and make sure your anti-virus software is always up to date. Several options are available for backing up your data, including:
|
Expand | ||
---|---|---|
| ||
Be conscientious of what you plug into your computer. Malware can be spread through infected flash drives, external hard drives, and even smartphones. |
Expand | ||
---|---|---|
| ||
Always be careful when clicking on attachments or links in emails. If it’s unexpected or suspicious for any reason, don’t click on it. Double-check the URL of the website the link takes you to bad actors who will often take advantage of spelling mistakes to direct you to a harmful domain. When in doubt, forward the message to phish@appstate.edu. |
Expand | ||
---|---|---|
| ||
Keep all software on internet-connected devices (including personal computers, smartphones & tablets) current to reduce the risk of infection from ransomware and malware. Why is updated software important? Why is preventing malware important? How do you keep software up to date? |
Expand | ||
---|---|---|
| ||
Be sure to monitor your accounts, both financial and social, for any suspicious activity. If you see something unfamiliar, it could be a sign that you’ve been compromised. |
Expand | ||
---|---|---|
| ||
Never leave your devices unattended. If you need to leave your computer, phone, or tablet for any length of time (no matter how short) lock it up so no one can use it while you’re gone. |
Expand | ||
---|---|---|
| ||
Information about you, such as purchase history or location, has value (just like money). Be thoughtful about who gets that information and how it is collected by apps, websites, and all connected devices. Set the privacy and security settings on websites to your comfort level for information sharing. It is OK to limit how and with whom you share information. Share With Care |
Expand | ||
---|---|---|
| ||
Practice good password management. Use a strong mix of characters, and don’t use the same password for multiple sites. Don’t share your password with others, don’t write it down, and definitely don’t write it on a post-it note attached to your monitor. |
Expand | ||
---|---|---|
| ||
Why should you secure your mobile devices? How do you secure your mobile devices? |
Expand | ||
---|---|---|
| ||
Sensitive browsing, such as banking or shopping, should only be done on a device that belongs to you, on a network that you trust. Whether it’s a friend’s phone, a public computer, or a café’s free WiFi, your data could be copied or stolen. |
Expand | ||
---|---|---|
| ||
Why use security tools? How do security checkups work? |
Expand | ||
---|---|---|
| ||
Why are unique passwords important? What makes for a strong password? How do you manage better and unique passwords? |
Expand | ||
---|---|---|
| ||
Realize that you are an attractive target to hackers. Don’t ever say, “It won’t happen to me.” You may not realize it, but you are a target for cybercriminals. Your computer, your mobile devices, your accounts, and your information all have tremendous value to cybercriminals around the world. |
Expand | ||
---|---|---|
| ||
For policies, standards, guidelines & tips see our security.appstate.edu |
Related Articles
Content by Label | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
|