Main Menu

Protect Your Tech

Cybercriminals are always working hard, looking for new ways to compromise your privacy. However, there are things you can do to reduce the risk to your data and your devices.

Password Management

Your password is your first, and possibly most important, defense against cybercriminals. Use a strong password, change it frequently, and never share it with others.

Password Guidelines

What makes a strong password

A strong password is not easily guessed, by a person or a computer program designed to do so.

Change passwords often

All users are strongly recommended to regularly change their passwords to all systems to ensure maximum protection. Bad actors typically make the majority of attempts at the beginning of terms and during the holidays. Users can better protect themselves by implementing strong passwords and changing them more frequently. In addition, students need to be aware that passwords will now have an expiration date assigned, forcing them to be changed.

How to remember your passwords

So, how do you remember strong passwords for each account, when you don’t reuse those passwords? Consider using a password manager. Many are free or low-cost, and they can generate strong passwords and store them for you so you don’t have to remember them.

Some considerations

Phishing and Malware

Phishing occurs when an attacker pretends to be someone else to get your login credentials or other personal information.

Malware includes viruses, ransomware, and spyware. All are software installed on your device without your knowledge to acquire your private data, logins, or even lock your files until you pay a ransom.

How to recognize a phishing attempt

Not all email is legitimate. The best line of defense to protect your account and affiliated data is to recognize phish/spam emails. These emails may look enticing, as many revolve around unique job opportunities or free goods. Always use caution when viewing and processing email. Please take extra care whenever asked to access another link or open any attachments.

Here are some rules of thumb to identify red flags in determining a valid email:

To better assist you, we recommend users become more educated regarding phishing emails by participating in the Google Phishing quiz. This quiz is a highly interactive and engaging tool that will provide you with the keys to identify legitimate emails. In addition, the IT Services website is a great resource for learning more. 

Other tips to stay safe online