Physical Security
Keep track of your phone, table, laptop and other mobile devices. Do not leave your mobile device unattended. It does not take long for someone to grab an unattended device.
Protect your Data
Password protect your device with a strong password.
Without a password your machine is unprotected and can be compromised by anyone with access to your device. A weak password like, Fluffy, Password1, QWERTY, or 1234 will be quickly guessed, allowing access to your device. Follow the advice on our website password.utica.edu. A strong password should be at least 8 characters, with a mixture of upper and lower case letters and number. Password cracking programs are on to our tricks. Simply replacing characters, like $ for the letter s, the number 0 for a letter o, or using the number 3 for the letter E are well known and can be easily defeated. You can take a phrase such as This year I will lose 10 pounds. convert that into TyIwl10#. Strong Passphrases can be less complex, but should be at least 14 characters long. Take a song title and shorten it. Wake Me Up Before you Go Go turns into WaMeupbeyogogo. WaMeupbeyogogo is not a good password, because it is published on this webpage. Come up with your own phrase.
Update your Software and Operating System Software
Many security incidents can be prevented by making sure your software on phones, tablets, and computers, is current.
Install current versions of Antivirus and Antimalware software.
Windows, Android, and Mac machines are vulnerable to viruses and malware.
Watch out for trial versions and software that is out of date and don’t let your protection expire. There are many free and paid products available.
Use a Firewall
Firewall software can help protect your computer against someone attacking your computer remotely. Remote attackers can use your device just as if they were sitting in front of the device. This allows the attacker to message your friend, steal your information, or erase everything on your device and on the cloud.
Be Careful on Public Wi-Fi
Open Wi-Fi networks are designed for ease of use, not security. Use these networks for casual browsing, but not for logging into personal accounts or making online purchases. Consider using a virtual private network (VPN) or a personal/mobile hotspot if you need a more secure connection on the go.
Be Careful Internet Café and Hotel Guest Machines
These machines are used my many people each day and often are not adequately protected. These devices have a higher likely hood of being infected with viruses, worms, key loggers or other malware. These devices may be good for looking up the weather, but do not log into any accounts or make any purchases on them. Make sure to clear your Internet history and completely log off the computer when done.
Encrypt Sensitive Data
First, don’t store sensitive data unless you need to. If it’s not there, nobody can steal it. Encryption helps protect data in the event your device is stolen. However, if you have an easily guessed password the thief can easily unlock the protection and access your encrypted files. Do not forget your encryption password or you may lose everything you are trying to protect.
Phishing
Don’t get caught off guard. Utica University will never email you asking for your personal information. Don’t send private information via email and be careful what links you click on.
When it’s time to get rid of your device