Information security starts with you! Stay current on privacy and security. Articles here are designed to help you do just that. Below are five things you can (and should) be doing right now :
1. Beware of fraud. Be skeptical of email, text messages, Internet search results, and websites. Verify sources using a different method (phone, Internet search). If something seems "phishy," it probably is.
2. Use unique, long passwords for every account. Enroll in multi-factor authentication (MFA) whenever possible.
3. Update your software - the operating system, web browser(s), apps, and programs. Configure automatic software updates wherever possible. Old software is vulnerable and makes your data vulnerable.
4. Trust the network you are connecting to. Use your phone as a hotspot if in doubt. If you must use a public WiFi network, connect to a VPN to keep your data private.
5. Lock your devices when not in use - a password, fingerprint, or PIN code.
Institutional policies including the written information security policy, acceptable use, and online account policies.
Avoid scams by limiting your social media footprint, being skeptical of online offers and validating the source.
Tips and practices for the secure use of technology and data at Colby
Colby ITS has deployed an anti-malware tool named DetectX to some Colby managed Macintosh computers with older operating systems. This installation is silent and does not require your interaction. However, you may notice a few changes once the software is installed.
How much does a website know about you? It's important to understand how to keep your information private when using Internet web browsers.
Your Internet web browser may be the most important - and vulnerable - piece of software on your computer or device. Keeping it up to date and secure is important.
Keeper is an online password manager and secret sharing platform available for Colby faculty and staff who manage high risk data.
Methods for keeping software, like web browsers and operating systems, updated with latest security patches and bug fixes.
Kleopatra is program built on the open source program GNU Privacy Guard (GPG) for Windows computers that allows a user to manage cryptographic keys; and to encrypt and decrypt files.
How secure is your network connection? There are things you can do to keep your data secure as it is transmitted across wireless and wired computer networks.
You probably have more online accounts than you can keep track of. If you keep track of your passwords by writing them down, using a spreadsheet or local file, or "have a system" for using passwords, you should read this.
Fraudulent messages received through email, text message, or even telephone are designed to steal your passwords, personal data, and even money. Learn more about how to recognize these threats and what to do if you receive one.
Colby employs a Proofpoint email security gateway to scan and filter malicious or unsolicited emails. This article explains how this works, how to review what it is doing with your email, and options you have for how your messages are (or aren't) filtered.
Ransomware is among the most disruptive forms of cyber attack. This article explains the threat and what you need to know about it.
Do you use Facebook, Instagram, or LinkedIn? If you do, how familiar are you with the privacy settings on these platforms - and the risks if those protections are not employed?
To scan or not to scan? The risks associated with QR codes and tips to safely scan them.
Helpful information about securely moving data from one system or person to another
Going somewhere? Some countries have data protections in place, others intentionally do not. Stay up to date on how to keep your devices and information private when you travel outside of your home country. For some destinations, it's best to leave them at home.
Your computer or workstation probably has a lot of your information stored on it. You also probably use it to access all sorts of information and data. What can you do to make sure it stays secure?