Security Tips for Protecting Yourself at Home
see also more general information on working from home on the Digital Resilience page
- Think Before You Click. Cyber criminals are taking advantage of people seeking information on COVID-19. They are distributing malware campaigns that impersonate organizations like WHO, CDC, and other reputable sources by asking you to click on links or download outbreak maps. Slow down. Don’t click. Go directly to a reputable website to access the content.
- Lock Down Your Login. Create long and unique passphrases for all accounts. If possible and for your personal accounts, use multi-factor authentication (MFA) wherever possible. MFA will fortify your online accounts by enabling the strongest authentication tools available, such a unique one-time code sent to your phone or mobile device.
Leave sensitive data stored securely on LC servers and access it remotely via the LC VPN.
- The LC VPN provides a secure and encrypted way of connecting to college services remotely. If you need to use specialized software or access large data sets that you have access to on your local workstation, remote desktop may be a viable option. This would let you connect to and interact with your desktop from a remote location as if you were here.
1. Go to the LC VPN web page [https://gp.lclark.edu]
2. Login with your LC account to initiate the GlobalProtect VPN client installation.
3. Access your resource as if you are on campus.
Note: You may need to enter gp.lclark.edu for the Portal address.
Please contact the Service Desk for assistance installing the VPN client software at 503-768-7225 or email firstname.lastname@example.org.
By using the College’s VPN service, all parties agree to and abide by the Technology Policies.
Separate your network so your company devices are on their own WiFi network, and your personal devices are on their own.
- Update home routers to the most current software and secure with a lengthy, unique passphrase.
- Change default passwords on your devices (ie: routers, IoT)
- Keep devices with you at all times or stored in a secure location when not in use. Set auto log-out if you walk away from your computer and forget to log out.
- Limit access to the device you use for work. Only the approved user should use the device (family and friends should not use a work-issued device).
Use company-approved/vetted devices and applications to collaborate and complete your tasks. Don’t substitute your preferred tools with ones that have been vetted by the IT team.
- Do not store sensitive data on any internal or external local media. If you cannot use the VPN and must store data locally, use encryption to protect data stored on physical media.
Update everything and install security patches. Before connecting to your corporate network, be sure that all internet-connected devices ‒ including PCs, smartphones and tablets ‒ are running the most current versions of software. Updates include important changes that improve the performance and security of your devices. Configure the applications you do require to automatically update and/or notify you of available updates.
Windows and Mac OS updates - Schedule and install operating system updates and security patches.
Anti-virus/Anti-malware - Run updates and schedule scans on your computer for commercial products.
Visit the Microsoft Security Center - Download Security Essentials and check for malware with Microsoft’s Safety Scanner
Web browsers - web browsers (Firefox, IE, Chrome).
Web browser plug-ins - Update helper applications, such as Adobe Acrobat Reader, Flash and Oracle’s Java.
Adobe Acrobat., are fully up-to-date. These applications are increasingly being targeted by malware authors over operating system vulnerabilities because so many users fail to patch them consistently.
Be careful what networks you connect to. If you will be connecting to networks that are not your own, use the LC VPN service whenever possible. Anybody can bring up a wireless network and call it whatever they want, hoping to lure unsuspecting travelers into connecting. Don’t connect to rogue networks - this can make it easy for someone to intercept and even alter your communications.
- Do not automatically join any wireless networks from laptops or cell phones. Manually pick the specific network you want to join.
- Turn off Bluetooth when it’s not actively being used.