Avoid using Box or Dropbox for storing UT information unless you have received expressed permission from your department. Use Microsoft 365 (OneDrive & SharePoint) or Google Drive for storing UT-related information. Limit the downloading of games or other non-essential apps, which are a common source of computer infections, potentially exposing your students’ and colleagues’ personal information to hackers. FERPA and HIPPA laws apply to all important data regardless of your location. They could inadvertently delete important files. Avoid sharing your work device with family and friendsĭon’t allow your children to use your computer or other work devices. Don’t save things to your personal machine or on any shared media – use UT’s OneDrive or Google Drive instead. Only use supported and current operating systems to conduct UT business. Perform the recommended updates to all of your devices, including mobile phones, home routers, security cameras, and of course, the computer you use to access UT resources. Review OIT’s tips for protecting your UT accounts. Your workspace is where you go when you mean business so avoid using the same space for those hour-long Netflix marathons. Your computer should be password-protected with a strong password that is required at start-up and login. Set up two-factor authentication when available. Keep your home router up to date by installing any software and firmware updates to address security issues.įor any website or service that requires a password, create strong passwords, and don’t reuse the same password.Check your internet provider’s online documentation on how to set a secure Wi-Fi password.Set a password for your home wireless and verify that you are not using the default administrator password.Your home wireless network could make you and your family vulnerable. Annual training is not only required, but will keep you in top form. Stay up to date with your security awareness training. Learn how to recognize typical phishing attempts. Any sense of urgency, offers that are too good to be true, or requests for personal information could all be attempts to gain access to your accounts and data. Take the time to discern cyberattack attempts by phone and in email.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |