Information Security Tips
1. Pack it up and take your laptop with you, even if you intend to be right back.
Unattended laptops in public places like the library, study lounge, and coffee shops are an invitation for theft or unwanted access to your information.
2. Password protect and track your mobile device(s).
Mobile devices can be easily lost or stolen. Always protect them with a password or PIN (6 digits or better). Also, configure your device to enable remote location and wiping in case it is lost or stolen:
3. Create strong passwords that are unique for each service.
Passwords are easily guessed and/or cracked with today’s computing power, or known as a result of the numerous account breaches. Don’t use the same password for multiple accounts. Consider using a password manager to generate complex passwords. A password manager will help keep passwords and accounts in sync.
(note: LC does not support the use of a password manager to store LC passwords. Use beyond password generation for your personal use.)
4. Don’t reply to phishing emails requesting your account, username, password, or other sensitive information.
Phishing, or spear phishing, emails look legitimate and ask for your username and password under the guise of a perceived, sometimes urgent, need.
NEW training tool can test your ability to spot a phish!
5. Don’t blindly accept invitations in your social networks (Facebook, Twitter, LinkedIn, etc), don’t open attachments or installers from others, and don’t click on links in emails from unknown senders.
Unless you are explicitly downloaded the file or software for installation, never open it.
If you are unsure, call the sender to confirm they sent you something. Instead of clicking one the URL in the email message, copy and paste it into a web browser or visit it by manually typing in the address.
6. Update everything and install security software:
Windows and Mac OS updates - Schedule and install operating system updates and security patches.
Anti-virus/Anti-malware - Run updates and schedule scans on your computer for commercial products.
Web browser plug-ins - Update helper applications, such as Adobe Acrobat Reader, Flash and Oracle’s Java
Visit Qualys, a trusted security leader, and use their free browser check tool.
Visit Mozilla, makers of Thunderbird and Firefox, and check your Firefox browser plug-ins.
Below are links to Oracle’s web pages for uninstalling or disabling Java on your computer:
7. Stop illegal file-sharing and remove your peer-to-peer (P2P).
It is against the law to share or distribute copyrighted material. Learn how L&C responds to copyright infringement claims.
8. Set privacy for social networking sites.
Learn how to set the privacy settings so they are as restrictive as possible and protect your reputation. Also be careful what you post/publish on your social networking sites.
9. Stay away from untrusted networks or public computers.
Be careful when using free, public wireless networks at hotels, airports, and coffee shops or public computers. Refrain from doing any sensitive online activities or using any account information and always ensure you log off of public computers.
10. Turn off your computer when you’re not using it.
Save energy and keep your computer from being accessible from the Internet.
11. Back up your computer files regularly so you don’t lose important assignments, cherished music or photos.
Keep backed up files in a safe, secure location away from your computer (or use an online service).
12. Use caution when using public computers, such as those in hotels or computer labs.
Don’t visit sites that require personal information, such as your bank’s Web site, and be sure to log off when you’re done.
13. Trust your instincts.
If you feel like something is suspicious, error on the side of caution. If your spidy senses are tingling, trust them.