AbleToTrain by Willing & Able

List of security tips for computing

Hackers are interested in you

Never assert that “I won’t experience it” The stakes are enormous for all of us, including your financial and personal security as well as the standing and reputation of the university.

  • Everyone has a duty to protect themselves online.

  • You can help to safeguard both yourself and others by heeding the advice provided below and exercising caution.  


Maintain software updates

It’s crucial to install software updates for your operating system and programs. For your devices, always install the most recent security updates:

  • For your operating system, activate Automatic Updates.

  • Use web browsers with regular, automated security upgrades, such Chrome or Firefox.

  • Flash, Java, and other browser plug-ins should all be kept up to date.


Avoid phishing schemes and be cautious of ominous emails and calls

Cybercriminals will try to deceive you into disclosing personal information such as your login ID and password, banking, or credit card information using a variety of social engineering techniques, which are a persistent threat.

Phishing scams can be carried out by phone, text, or social networking sites, but email is where they are most frequently used.

Any email or phone call that appears professional and requests personal or financial information should be avoided.


Use effective password management

We all have too many passwords to keep track of, and it’s simple to use passwords repeatedly. You can save secure, one-of-a-kind passwords for all of your accounts by using a password manager. These tools can help you create secure passwords, enter login information automatically, and receive reminders to change your passwords on a regular basis.


Be cautious when clicking

Avoid downloading software from unreliable sources or going to unfamiliar websites. These websites frequently host malware that will discreetly and automatically corrupt your machine.

Do not click on any links or attachments in emails that are unexpected or suspect for any other reason.


Never unsupervised use of devices

Your gadgets’ technological security and physical security are both equally crucial.

Lock up your laptop, phone, or tablet if you must leave it unattended for an extended period of time to prevent theft.

Make sure the protected data is encrypted and locked up if you store it on a flash drive or external hard disk.

When not in use, desktop computers should either be shut off or have their screens locked.


Protect sensitive data

Know the restrictions that apply to any Protected Data you may encounter. All in all:

Keep sensitive Protected Data off of your workstation, laptop, and mobile devices, such as Social Security numbers, credit card numbers, school data, and health information.

When they are no longer required, safely remove sensitive data files from your machine.

When storing or transmitting sensitive data, encryption should always be used.


Safely utilize mobile gadgets

You’ll want to make sure you are protected because of how heavily we rely on our mobile devices and how easily they can be attacked:

  • Never leave your gadget vulnerable in a public place; lock it with a PIN or password.

  • Install programs only from reputable stores (Apple AppStore, Google Play).

  • Update the operating system on the device.

  • Inappropriate emails or texts should not contain links or attachments.

  • Do not send or store any private information on the device.

  • The majority of portable devices can use data encryption; to learn about your specific device’s possibilities, visit its manual.

  • the Android Device Manager, for example

  • tools to aid in preventing theft or loss.

  • Set up antivirus and anti-malware software.

  • Install these programs only from a reputable and well-known source. Update your software, engines, and virus definitions frequently to keep your programs functioning properly.


Make a data backup

Create regular backups since erasing and reinstalling the operating system is the only surefire way to fix your computer if you become a victim of a security event.