Secure Computing

What can I do to protect my new devices?
When you bring home a new consumer device, check to see if it’s transmitting. Ask whether you need that device to be connected. What are the advantages o...
Wed, Sep 23, 2020 1:39 PM
How can I protect my data?
There are very few, if any, verticals such as higher education that transmit, process, access, and share such varying sensitive data elements. There is not ...
Wed, Sep 23, 2020 1:47 PM
Travel tips for information security
Back-up your data! Backing up your data ensures that you won’t lose information if your device is lost or stolen. Consider encrypting your data as we...
Wed, Sep 23, 2020 1:50 PM
Online Safety and Security Tips
Set up alerts. Consider setting up alerts on your financial accounts. Many credit card companies and banks allow you to set up alerts on your accounts vi...
Wed, Sep 23, 2020 1:52 PM
Secure your mobile devices
Encrypt sensitive information. Add a layer of protection to your files by using the built-in encryption tools included on your computer’s operating syste...
Wed, Sep 23, 2020 1:56 PM
What is 2FA (Two Factor Authentication)?
How does it work? Once you’ve activated two-factor authentication on an account, whenever an account login with your password comes from a different devi...
Wed, Sep 23, 2020 1:58 PM
How Can I Prevent Identity Theft
Keep your operating system up to date. When OS updates are released, they fix errors in the code that could let the bad guys in. Do the same for the a...
Wed, Sep 23, 2020 2:00 PM
What is Phishing?
Cybercriminals use types of social engineering—manipulating people into doing what they want—as the most common way to steal information and money. Social e...
Wed, Sep 23, 2020 2:03 PM
UW VPN (Husky OnNet) Big-IP Edge client
https://itconnect.uw.edu/connect/uw-networks/about-husky-onnet/
Fri, Mar 26, 2021 2:42 PM