Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Remember that technology alone cannot fully protect you.
    You are the best defense against malicious cyber activity. Cybercriminals often gain access to passwords, data and devices by tricking the user into giving it to them. Common indicators of this type of attack include:

    • Creating a tremendous sense of urgency, often through fear, intimidation, a crisis, or an important deadline.

    • Pressure to bypass or ignore security policies or procedures.

    • A message from a friend or co-worker in which the signature, tone, or wording doesn’t sound like them.

  2. Secure your home wireless network.
    Securing your network is key to protecting your home and devices, especially when you’re working from home. If you haven’t already, change the default administrator password on your router to a strong password or passphrase with more characters, and only allow people you trust to connect to your WiFi network.

  3. Use strong passwords
    The more characters you have in your passwords, the stronger they are. When asked to create a new password, consider using a passphrase (multiple words strung together). Make it easy to keep track of your passwords and passphrases by using a password manager like LastPass. Cal Poly offers LastPass Premium to faculty and staff at no cost, as well as, LastPass Families which gives faculty and staff five additional licenses to share with family and friends. 

  4. Make sure your software is up-to-date.
    Malicious actors are always looking for new vulnerabilities in software, and they use special programs to take advantage of them and hack into the devices you are using. Check your computers, mobile devices, programs, and apps to make sure they are running the latest software version. If not, update them and enable automatic updates, if possible.

  5. Don’t let anyone else use your work devices.
    Make sure family and friends understand they shouldn’t use your work devices. Information could be accidentally modified or erased, or worse, the device could accidentally be infected with a virus or malware.

...