Announcements

Currently there are no announcements.

News

There are no news available.

This Week's Events

There are no events for this week

IT Office

Security First

This article has been published on Cybint Security website. You may access the original text through this link.


1. You Are A Target.

Realize that you are an attractive target to hackers. Don’t ever say “It won’t happen to me.

2. Eight Characters Is Not Enough.

Practice good password management. Use a strong mix of characters, and don’t use the same password for multiple sites. Don’t share your password with others, don’t write it down, and definitely don’t write it on a post-it note attached to your monitor.

3. Lock It Up.

Never leave your devices unattended. If you need to leave your computer, phone, or tablet for any length of time—no matter how short—lock it up so no one can use it while you’re gone. If you keep sensitive information on a flash drive or external hard drive, make sure to lock it up as well.

4. Practice Safe Clicking.

Always be careful when clicking on attachments or links in email. If it’s unexpected or suspicious for any reason, don’t click on it. Double check the URL of the website the link takes you to: bad actors will often take advantage of spelling mistakes to direct you to a harmful domain. Think you can spot a phony website? Try our Phishing Quiz.

5. Beware Of Browsing.

Sensitive browsing, such as banking or shopping, should only be done on a device that belongs to you, on a network that you trust. Whether it’s a friend’s phone, a public computer, or a cafe’s free WiFi—your data could be copied or stolen.

6. Back It Up.

Back up your data regularly, and make sure your anti-virus software is always up to date.

7. Physical Cyber Safety.

Be conscientious of what you plug in to your computer. Malware can be spread through infected flash drives, external hard drives, and even smartphones.

8. Share Less Sensitive Information.

Watch what you’re sharing on social networks. Criminals can befriend you and easily gain access to a shocking amount of information—where you go to school, where you work, when you’re on vacation—that could help them gain access to more valuable data.

9. Cut Out The “Middle Man”.

Offline, be wary of social engineering, where someone attempts to gain information from you through manipulation. If someone calls or emails you asking for sensitive information, it’s okay to say no. You can always call the company directly to verify credentials before giving out any information.

10. Stay On Top Of  Your Accounts.

Be sure to monitor your accounts for any suspicious activity. If you see something unfamiliar, it could be a sign that you’ve been compromised.

We use cookies to analyze our traffic. We also share information about your use of our site with our social media, advertising and analytics partners who may combine it with other information that you’ve provided to them or that they’ve collected from your use of their services. You consent to our cookies if you continue to use our website. For detailed information about how we use, erase and block cookies, please read our Cookie Policy page.
x