Secure Computing
When you bring home a new consumer device, check to see if it’s transmitting. Ask whether you need that device to be connected. What are the advantages o...
Wed, Sep 23, 2020 1:39 PM
There are very few, if any, verticals such as higher education that transmit, process, access, and share such varying sensitive data elements. There is not ...
Wed, Sep 23, 2020 1:47 PM
Back-up your data! Backing up your data ensures that you won’t lose information if your device is lost or stolen. Consider encrypting your data as we...
Wed, Sep 23, 2020 1:50 PM
Set up alerts. Consider setting up alerts on your financial accounts. Many credit card companies and banks allow you to set up alerts on your accounts vi...
Wed, Sep 23, 2020 1:52 PM
Encrypt sensitive information. Add a layer of protection to your files by using the built-in encryption tools included on your computer’s operating syste...
Wed, Sep 23, 2020 1:56 PM
How does it work? Once you’ve activated two-factor authentication on an account, whenever an account login with your password comes from a different devi...
Wed, Sep 23, 2020 1:58 PM
Keep your operating system up to date. When OS updates are released, they fix errors in the code that could let the bad guys in.
Do the same for the a...
Wed, Sep 23, 2020 2:00 PM
Cybercriminals use types of social engineering—manipulating people into doing what they want—as the most common way to steal information and money. Social e...
Wed, Sep 23, 2020 2:03 PM
https://itconnect.uw.edu/connect/uw-networks/about-husky-onnet/
Fri, Mar 26, 2021 2:42 PM