While many of us are security conscious with campus technology, it is easy to become complacent with our home computers. ITS advices faculty, staff and students to be on guard at home as well. The same rules apply and here are a few important reminders to keep you cyber secure at home.
Educate yourself. One of the best defenses is education. Visit the Microsoft Website to watch a number of short on-line videos regarding “Security at Home”.
Use anti-virus software, a firewall, and anti-spyware software to help keep your computer safe and secure. The UNMC license for Symantec Antivirus Software is also available for home use at no additional charge for faculty, staff, and students. UNMC faculty and staff may obtain the software utilizing their home Internet Service Provider (ISP) and logging into Employee Services (eServ) with their UNMC NetID and password. Click on ITS > software download quick link. And remember, this must be updated regularly.
Be sure to set up your operating system and Web browser software properly, and update them regularly. Hackers take advantage of unsecured Web browsers (like Internet Explorer or Netscape) and operating system software (like Windows or Linux). Lessen your risk by changing the settings in your browser or operating system and increasing your online security. Check the "Tools" or "Options" menus for built-in security features. If you need help understanding your choices, use your "Help" function.
Beware of Attachments and Downloads. Downloaded files have the potential to adversely affect PC functionality by taking up needed disk space and/or introducing malicious code. Therefore, it is important to use caution when downloading information from the Internet. Only download information from trusted sources and ensure virus protection is active with a current updated release.
Back up important files. No system is completely secure. If you have important files stored on your computer, copy them onto a removable disc, and store them in a secure place. Also, make sure you keep your original software start-up disks handy and accessible for use in the event of a system crash.
Be on Guard for Identity Theft Schemes. Again, the same rules at work apply for home use.
Watch out for unsolicited requests via e-mail for confidential information (i.e. your own personal information, patient information, student information, corporate credit card).
- Never click on a suspicious hyperlink in an unsolicited e-mail.
- Look at the address in the address bar of your Web browser.
- Don't reply to the e-mail if you have a question or are suspicious.
And remember… cyber-security is an ongoing process.
Information Security Plan
Information Security Policies
Information Security Procedures
Homeland Security News & Events
- One Chart Compliance (21CFR Part 11)
Store IT Securely
"Security is not a project -- it's a process!"