Safe Computing Best Practices

computer-1294045__180Technology alone cannot protect us from security vulnerabilities.  Hackers exploit human vulnerabilities and this is one of the main causes of security breaches today. Following the best practices below will help at work and at home. If you access DMU resources from a home computer, you will need to implement these steps yourself.

  1. Passwords. Use strong passwords, and use different passwords for different types of systems (e.g., don’t use your DMU systems passwords on social media sites, and use yet different ones for your financial sites, etc.), and never, ever share your passwords with others.
  2. Malware. Scan all files downloaded from the Internet, and otherwise loaded onto any of your computing systems, with anti-virus software and then use those files with caution.
  3. Encryption. Encrypt stored sensitive and critical information such as educational records, Social Security Numbers, identification numbers (GWID), and credit cards numbers. Also encrypt non-public information that is sent through the public Internet.
  4. Protect information. Do not put or leave University information in locations where unauthorized individuals can see it.
  5. Network access. Do not connect other networks to DMU networks; contact the CIO if you have such a need.
  6. No snooping! Only access information needed to perform your work responsibilities.
  7. Don’t fall for it. Watch out for requests (through email, by phone, or online) asking you for DMU information. Crooks often use such social engineering and phishing messages to trick you into divulging confidential information.  Your ITS Department, including the Help Desk will never ask you for your login and password information.
  8. Be alert! Notify the CIO or Director of Infrastructure/ISO immediately of you suspect any information security problems, or have any information security incidents, such as disclosed passwords, or lost/stolen access control mechanisms.