Hackers are interested in you
Never assert that “I won’t experience it” The stakes are enormous for all of us, including your financial and personal security as well as the standing and reputation of the university.
Everyone has a duty to protect themselves online.
You can help to safeguard both yourself and others by heeding the advice provided below and exercising caution.
It’s crucial to install software updates for your operating system and programs. For your devices, always install the most recent security updates:
For your operating system, activate Automatic Updates.
Use web browsers with regular, automated security upgrades, such Chrome or Firefox.
Flash, Java, and other browser plug-ins should all be kept up to date.
Cybercriminals will try to deceive you into disclosing personal information such as your login ID and password, banking, or credit card information using a variety of social engineering techniques, which are a persistent threat.
Phishing scams can be carried out by phone, text, or social networking sites, but email is where they are most frequently used.
Any email or phone call that appears professional and requests personal or financial information should be avoided.
We all have too many passwords to keep track of, and it’s simple to use passwords repeatedly. You can save secure, one-of-a-kind passwords for all of your accounts by using a password manager. These tools can help you create secure passwords, enter login information automatically, and receive reminders to change your passwords on a regular basis.
Avoid downloading software from unreliable sources or going to unfamiliar websites. These websites frequently host malware that will discreetly and automatically corrupt your machine.
Do not click on any links or attachments in emails that are unexpected or suspect for any other reason.
Your gadgets’ technological security and physical security are both equally crucial.
Lock up your laptop, phone, or tablet if you must leave it unattended for an extended period of time to prevent theft.
Make sure the protected data is encrypted and locked up if you store it on a flash drive or external hard disk.
When not in use, desktop computers should either be shut off or have their screens locked.
Know the restrictions that apply to any Protected Data you may encounter. All in all:
Keep sensitive Protected Data off of your workstation, laptop, and mobile devices, such as Social Security numbers, credit card numbers, school data, and health information.
When they are no longer required, safely remove sensitive data files from your machine.
When storing or transmitting sensitive data, encryption should always be used.
You’ll want to make sure you are protected because of how heavily we rely on our mobile devices and how easily they can be attacked:
Never leave your gadget vulnerable in a public place; lock it with a PIN or password.
Install programs only from reputable stores (Apple AppStore, Google Play).
Update the operating system on the device.
Inappropriate emails or texts should not contain links or attachments.
Do not send or store any private information on the device.
The majority of portable devices can use data encryption; to learn about your specific device’s possibilities, visit its manual.
the Android Device Manager, for example
tools to aid in preventing theft or loss.
Set up antivirus and anti-malware software.
Install these programs only from a reputable and well-known source. Update your software, engines, and virus definitions frequently to keep your programs functioning properly.
Create regular backups since erasing and reinstalling the operating system is the only surefire way to fix your computer if you become a victim of a security event.
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |