Pinnacle 10 Secure Computing Recommendations

“Top 10” List of Secure Computing Tips

Tip #1 – You are a goal to hackers

Don’t ever say, “It might not take place to me.” We are all at chance and the stakes are high – each in your non-public and economic well-being  and for the college’s status and reputation. 

Cybersecurity is everybody’s duty.

By following the hints under and closing vigilant, you are doing all your element to shield your self and others.

Tip #2 – Keep software up to date

Installing software program updates on your operating system and programs is essential. Always install the today’s safety updates in your devices:

Turn on Automatic Updates for your operating device.

Use web browsers along with Chrome or Firefox that receive frequent, automated security updates.

Make positive to hold browser plug-ins (Flash, Java, etc.) up-to-date.

Tip #three – Avoid Phishing scams – watch out for suspicious emails and speak to calls

Phishing scams are a consistent threat – the usage of numerous social engineering ploys, cyber-criminals will try to trick you into divulging non-public information which include your login ID and password, banking or credit score card data.

Phishing scams can be done by way of phone, text, or via social networking sites – but maximum commonly by e mail.

Be suspicious of any reliable-searching electronic mail message or smartphone call that asks for non-public or economic information.

Check out our Phishing Resources segment for information about identifying phishing scams and protecting your self.

Tip #four – Practice properly password control

We all have too many passwords to manipulate – and it is easy to take quick-cuts, like reusing the equal password.  A password supervisor can help you to keep strong particular passwords for all your debts.  These programs can generate sturdy passwords for you, input credentials robotically, and remind you to update your passwords periodically. UC Berkeley gives free LastPass Premium to all customers with a CalNet ID.

Our Protecting Your Credentials how-to article contains specific hints for keeping your password safe.

Tip #five –  Be cautious what you click

Avoid journeying unknown websites or downloading software from untrusted assets. These sites often host malware with the intention to routinely installation (often silently) and compromise your laptop.

If attachments or links inside the e-mail are sudden or suspicious for any cause, do not click on on it.

ISO recommends the use of Click-to-Play or NoScript, browser add-on features that save you the automated download of plug-in content (e.g., Java, Flash) and scripts that may harbor malicious code.

Tip #6 – Never leave gadgets unattended

The bodily security of your gadgets is just as important as their technical protection. 

If you want to leave your pc, cellphone, or tablet for any length of time – lock it up so nobody else can use it. 

If you hold protected information on a flash power or external tough force, make certain their encrypted and locked up as properly. 

For laptop computer systems, lock your display screen or close-down the machine whilst not in use.

Tip #7 – Safeguard Protected Data

Be privy to Protected Data that you come into touch with and its related restrictions. Review the UCB Data Classification Standard to understand records safety stage requirements. In preferred:

Keep high-stage Protected Data (e.g., SSN’s, credit card statistics, scholar facts, health data, etc.) off of your notebook, computer, or cellular devices.

Securely put off touchy information files out of your system whilst they may be not wanted.

Always use encryption whilst storing or transmitting sensitive data.

Unsure of the way to keep or take care of touchy statistics?  Email us at protection@berkeley.edu. 

Tip #eight – Use cell devices accurately

Considering how a lot we depend on our cellular gadgets and the way susceptible they’re to assault, you’ll want to make sure you are blanketed:

Lock your device with a PIN or password – and in no way leave it unprotected in public.

Only installation apps from depended on sources (Apple AppStore, Google Play).

Keep the device’s operating machine up-to-date.

Don’t click on on links or attachments from unsolicited emails or texts.

Avoid transmitting or storing non-public facts on the device.

Most handheld devices are able to using data encryption – consult your tool’s documentation for to be had options.

Use Apple’s Find my iPhone or the Android Device Manager gear to help save you loss or theft.

Tip #9 – Install antivirus/anti-malware safety

Only installation those programs from a acknowledged and trusted source. Keep virus definitions, engines and software program up to date to make sure your applications stays powerful.

See our Minimum Security Standards Anti-Malware Software Guidelines for extra records 

Tip #10 – Back up your facts

Back up regularly – in case you are a sufferer of a security incident, the simplest guaranteed manner to repair your laptop is to erase and re-installation the machine.

Be the first to comment

Leave a Reply

Your email address will not be published.


*