The increased use of mobile technologies allows access to and use of sensitive university data from almost any location. To protect this data, the university must ensure that appropriate safeguards are in place and maintained.
Computing Services reminds you to store sensitive information on your portable computer for only as long as it is required and to remove the data when it is no longer needed.
What you can do to minimize your risk:
- Ensure the firewall and antivirus software (currently ESET Endpoint Security) is installed and enabled.
- Keep your operating system and software up to date.
- Only install software from official places like the Apple App Store, Google Play and Microsoft Store.
- Set up your device with a strong password. This will protect your information not only from hackers but from someone who finds your device if you lose it.
- Only connect by Wi-Fi with trusted, password-protected networks, and turn off settings that automatically search for Wi-Fi networks.
- When downloading an app take a good look at the permissions and don’t click “allow” to everything.
- Before you click on something think seriously about where it came from. Viruses and worms can infect your mobile phone from anything you download, from text attachments and Bluetooth transfers.
Unfortunately, cyber-based threats can significantly increase when you are travelling and devices can easily be compromised or stolen. When you travel, protect yourself by being cyber aware.
You can connect your cellphone, smart phone, laptop or tablet to the Internet at wireless access points, sometimes free of charge, at coffee shops, in hotels or at airports during your travels. These highly unsecure networks are accessible to everyone.
Protect your equipment
Protecting the physical security of your devices is just as important as protecting yourself through digital measures. Laptops and smartphones are popular targets for thieves since they are relatively small and can yield a high profit. A thief can transfer data from your unattended device to a secondary storage device and can upload malicious software to be accessed later.
- Do not let your devices out of your sight. Don’t leave your phone charging in a public conference room while you go for lunch or lend your phone to a stranger who needs to make a call.
- Lock up valuable and sensitive electronic equipment when it is not in use.
- Do not leave valuable or sensitive electronic equipment lying around your hotel room.
- Do not rely on “good hiding spots” within a hotel room to secure your equipment. This may be the first time you have seen the room but it is not the first time someone else has seen it.
- When travelling, keep your electronic equipment in your carry-on baggage to avoid potential in-flight loss or damage.