Body
Overview
This article highlights the role of the IT Solutions Information Security team in promoting cybersecurity awareness and protecting university data. It offers practical tips for students and employees on avoiding phishing, keeping software updated, using strong passwords, and securing personal devices. The goal is to encourage shared responsibility for staying safe online.
About
The IT Solutions Information Security team helps protect student and employee information, keep the University safe online, and spread awareness of cybersecurity best practices. While the team works to prevent, investigate, and remediate cybersecurity issues, it's everyone's responsibility to know best practices and remain vigilant.
Top Tips
Phishing
Phishing, also known as scams, includes any fraudulent activity like malicious emails, websites, text messages, and phone calls that try to steal your info.
What You Can Do:
- Make sure the sender is legit.
- Don’t open suspicious attachments or links.
- Don’t share personal information.
Patching
A patch is a software update that provides fixes and improvements, protecting devices from security threats. Old apps and operating systems are easy to take advantage of.
What You Can Do:
- Turn on auto-updates to keep software up to date.
- Use only official app stores to download apps.
- Be careful of free apps and check permissions.
Passwords
Your passwords are the keys to your devices and accounts, which contain your personal information. You can be at risk if your passwords are not secure and protected.
What You Can Do:
- Enable multi-factor (or two-factor) authentication for extra security.
- Don’t share, write down, or reuse your passwords.
- Use passwords or phrases with at least 12 characters and a mix of letters, numbers, and symbols.
Protect Your Devices
Computers and smart devices contain personal information, so keep them accounted for. Smart phones are usually the least protected of all devices, which makes them a target.
What You Can Do:
- Keep track of your devices and lock them with passwords.
- Old devices may still be storing info – don't leave them laying around.
- Correctly dispose of University technology no longer in use by contacting IT Solutions.
Still Need Help?
Visit the IT Solutions Center page to view current hours, locations, and contact information.