School navigation

Information Technology

General Safety Tips

Information Security Checklist

 
1. Never leave your laptop unattended in public spaces.

Whether you’re in the library, dining hall, or locker room, pack up your laptop and take it with you!  Also never leave your laptop visible in a locked car, as this invites criminals to do damage to both car and computer. 

Track your Apple products for free! 

2. Create strong, easy to remember passwords (or passphrases) and keep them private.

Abbreviate a phrase, exchange numbers for letters and use special characters. Combine phrases together to create long, complex passwords that are easy to remember and never share it with anyone, even if asked for it.  More Tips

Information Technology will never ask for your password! 

3. Don’t reply to phishing emails requesting your account information.

Phishing, or spear phishing, emails look legitimate and ask for your username and password under the guise of a perceived need, such as an email server upgrade.

Never respond to requests for personal information unless you know that it is required and you have read a privacy agreement.

4. Don’t blindly accept invitations in your social networks (Facebook, Twitter, LinkedIn, etc), don’t open attachments or installers from others, and don’t click on links in emails from unknown senders.

Unless you are explicitly downloaded the file or software for installation, never open it.

If you are unsure, call the sender to confirm they sent you something.  Instead of clicking one the URL in the email message, copy and paste it into a web browser or visit it by manually typing in the address.  

5. Update everything and install security software:
Windows and Mac OS updates - Schedule and install operating system updates and security patches.
 
Anti-virus/Anti-malware - Run updates and schedule scans on your computer for commercial products.
Visit the Microsoft Security Center - Download Security Essentials and check for malware with Microsoft’s Safety Scanner

Web browser plug-ins -  Update helper applications, such as Adobe Acrobat Reader, Flash and Oracle’s Java

Visit Qualys, a trusted security leader, and use their free browser check tool.

Visit Mozilla, makers of Thunderbird and Firefox, and check your Firefox browser plug-ins.

 

Below are links to Oracle’s web pages for uninstalling or disabling Java on your computer:

How to uninstall Java on Windows

How to uninstall Java on Mac

Verify your Java version

If you need Java, get the latest version

How to disable Java in your web browser

 
6. Stop illegal file-sharing and remove your peer-to-peer (P2P).

It is against the law to share or distribute copyrighted material.  Learn how L&C responds to copyright infringement claims.

7. Set privacy for social networking sites.

Learn how to set the privacy settings so they are as restrictive as possible and protect your reputation.  Also be careful what you post/publish on your social networking sites.

8. Stay away from untrusted networks.

Be careful when using free, public wireless networks at hotels, airports, and coffee shops.  Refrain from doing any sensitive online activities or using any account information.

9. Turn off your computer when you’re not using it.

Save energy and keep your computer from being accessible from the Internet. 

10. Trust your instincts.

If you feel like something is suspicious, error on the side of caution.  If your spidy senses are tingling, trust them. 

                   

          Information Technology will NEVER ask for your password!