Wheaton College Norton, Massachusetts
Wheaton College
Technology

Cyber Security

It’s October and it’s National Cyber Security Awareness Month!

Today we are more interconnected than ever before. SPAM CostumeNot only do we use the Internet to stay connected, informed, and involved, but we rely on it for all of our day-to-day needs. The nation’s critical infrastructure relies heavily on the Internet for everything from submitting taxes, to applying for student loans, to following traffic signals, to even powering our homes. Can you imagine our lives without the Internet? Or iTunes???

LIS has gathered some interesting tidbits for your reading and watching pleasure.

Some things you already know and practice and some may be scary because you don’t practice them and should!!!

STOP! THINK! CONNECT!

STOP THINK CONNECT
Stop: Before you use the Internet, take time to understand the risks and learn how to spot potential problems. Think: Take a moment to be certain the path ahead is clear. Consider how your actions online could impact your safety, or your family’s. Connect: Enjoy the Internet with greater confidence, knowing you’ve taken the right steps to safeguard yourself and your computer.

Security Tips

  1. LIS Technology Support would NEVER request passwords or other personal information via email, over the telephone, or in person!!!!
  2. If you don't understand the warning message, say no and consult Tech Support. It's easier to go back and say yes if you need to than be sorry and have to rebuild your machine.
  3. Certificates: If you don't understand a website certificate message, say no and consult Tech Support. It is easier to go back and say yes if you need to than be sorry and have to rebuild your credit.
  4. Antivirus: Running antivirus does not slow your computer down nearly as much as a virus does… keep it running and up to date!
  5. Back-up: Backing up your data may seem like a waste of time — er, until you spill coffee all over your laptop.
  6. Passwords: Writing down your password around your desk is about as secure as leaving a $20 bill lying on the dashboard of your car. How well do you trust anyone these days?
  • Links to more info:
  • Protect Your Equipment
    • Use Passwords
    • Install anti-virus software and update frequently
    • Be sure your Operating System software is updated frequently
    • Scan your computer on a regular basis for spyware
    • If you do college work at home on your personal computer, you must make sure your computer is protected and that you don't save your work on the computer.
    • Remember when you delete a file it does not remove it entirely!
    • When it comes time to replace your computer be sure to thoroughly wipe the hard drive before it leaves your possession.
    • Before the college recycles computers we follow the Department of Defense Guidelines to make sure it is wiped completely. Please call Technology Support for additional information.
    • If you use CDs or DVDs to hold back up data, destroy them when no longer needed by wrapping them in a paper towel and shattering them!

     

  • Protect Your Laptop - Why????
    • They hold a wealth of information, both personal and professionalWhy should you care????
    • Let's put it this way, if you lose it and it falls into someone else's hands they could become you!
    • Tips to keep it safe
      • Password protect it
      • Do not keep private / sensitive data stored on the laptop
      • Back up to an external location (and keep that safe)
      • If you log into an application or service be sure to log out
      • If stolen, notify the police, your bank, and credit card companies. Also notify the Credit Bureau, so they can track your credit

     

  • Protect Your PDA / Cell Phone - Why????
    • They hold personal information, including calendars / professional contacts
      Why should you care????
    • It keeps a record of all the phone calls that you have made and received
    • In the wrong hands your information becomes their information
    • Tips to keep them safe
      • Password protect them
      • If storing spreadsheets or word documents be sure they are also password protected
      • Sync / Back up to an external location (and keep that safe)
      • If lost or stolen, notify your wireless provider, as some devices may be wiped remotely or use an app like Phone Locator
      • Before replacing the device be sure to wipe it
  • Keeping Safe on the Internet - Accessing the Internet
    • If you have a wireless router in your house and your own wireless network, be sure it is password protected! Anyone having access to it from another apartment in your building or your next door neighbor can use it if it isn't!
    • If you have to log in to a site, remember to log out.
    • Do not auto-save your passwords in your web browser.
    • If you are purchasing something on-line, be sure the site is a "secure" site. The web address must begin with HTTPS. Ask questions if you don't know!
    • Be careful who you chat with and always monitor who your children chat with

 

Laughter is the best medicine click on the links below for a chuckle.

"Passwords" by Sam Ennis, Iowa State University
"Share It Right" by Jonathan Kleinpass and Gabe Pannell, San Francisco State University
"Phishing: E-Safe" by Trenton Elliott, Eastern Michigan University
"IT Security Guards" by Anurakhavan Ketheeswaran, Seneca College
Cybercrime: It's not a laughing matter. Except for the funny parts.

 

If you have any questions please feel free to contact LIS, Technology Support at support@wheatonma.edu. Be safe out there!

Comments are closed.