ISP's "Top 10" List of Secure Computing Tips
Tip #1 - you're a target to hackers
Don t ever say "It will not happen to me". we have a tendency to are all in danger and therefore the stakes are high - to your personal and money well-being, and to the University's standing and name.
Keeping field computing resources secure is everyone's responsibility.
By following the information below and remaining vigilent, you're doing all of your half to safeguard yourself et al.
Turn on Automatic Updates for your software.
Use internet browsers like Chrome or Firefox that receive frequent, automatic security updates.
Make sure to stay browser plug-ins (Flash, Java, etc.) up to this point.
Utilize Secunia PSI (free) to seek out alternative computer code on your pc that must be updated.
Phishing scams is distributed by phone, text, or through social networking sites - however most typically by email.
Be suspicious of any official-looking email message or telephone that asks for private or money data.
Check out our Phishing Resources section for details concerning distinguishing phishing scams and protective yourself.
There are many on-line parole management services that provide free versions, and KeePass (link is external) may be a free application for macintosh and Windows.
Here are some general parole tips to stay in mind:
Use long passwords - twenty characters or additional is suggested.
Use a powerful mixture of characters, and ne'er use the identical parole for multiple sites.
Don t share your passwords and do not write them down (especially not on a Post-It note hooked up to your monitor).
Update your passwords sporadically, a minimum of once each vi months (90 days is better).
The Protecting Your Credentials how-to article contains careful recommendations for keeping your parole safe.
If attachments or links in email are sudden or suspicious for any reason, do not click on that.
ISP recommends exploitation Click-to-Play or NoScript (link is external), browser add-on options that forestall the automated transfer of plug-in content (e.g., Java, Flash) and scripts that may harbor malicious code.
If you would like to go away your laptop computer, phone, or pill for any length of your time - lock it up thus nobody else will use it.
If you retain sensitive data on a flash drive or external drive, ensure to stay these latched yet.
For desktop computers, shut-down the system once not in use - or lock your screen.
Keep sensitive information (e.g., SSN's, mastercard data, student records, health data, etc.) off of your digital computer, laptop, or mobile devices.
Securely take away sensitive information files from your system once they aren't any longer required.
Always use secret writing once storing or transmission sensitive information.
Unsure the way to store or handle sensitive data? Contact North American nation and ask!
Lock your device with a PIN or parole - and ne'er leave it unprotected publicly.
Only install apps from sure sources.
Keep your device's software updated.
Don t click on links or attachments from uninvited emails or texts.
Avoid transmission or storing personal data on the device.
Most hand-held devices are capable of using encryption - consult your device's documentation for on the market choices.
Use Apple's realize my iPhone (link is external) or the humanoid Device Manager (link is external) tools to assist forestall loss or felony.
Backup your information.
For personally-owned systems and unmanaged UCB owned computers, the field offers free anti-virus computer code, on the market for Windows and macintosh, to current college, staff, and students.
Here are some further tips to assist keep you safe and secure online:
Use a firewall - macintosh and Windows have basic desktop firewalls as a part of their software that may facilitate shield your pc from external attacks.
Use public wireless hot-spots sagely - follow the following tips (link is external) for staying safe.
Be conscientious of what you connect to your pc (flash drives and even good phones will contain malware).
Be careful of what you share on social networking sites.
Monitor your accounts for suspicious activity.
Bank or search on-line solely on sure devices and networks - and logout of those sites once you have completed your transactions.