DEFENSE AGAINST CYBER THREATS
All people have a choice to leverage technology for good or bad. One of the best ways to stay protected is to stay informed regarding the bad ways some people choose to use the Internet, social media and computers. Knowing what could happen enables us to make more informed decisions when trying to get our good work done.
For more information visit https://staysafeonline.org/stay-safe-online/.
Department of Homeland Security Tips: https://www.us-cert.gov/ncas/tips
Multi-Factor Authentication (MFA)
Turn on 2 Factor Authentication (2FA) for every service that supports 2FA. (Also known as 2 Step Verification)
When 2 Factor Authentication is activated, you'll log in with your usual ID and password, and then you'll be asked to enter a verification code. It will protect you if your username/password is compromised!
Antivirus is a vital part of the layered security approach and is installed on all Hamilton-owned servers and computers.
Install antivirus software on your personal Mac/ PC and ensure that it is updated. Antivirus is required for connecting to Hamilton's network. The Help Desk recommends using the free version of Avira. (Avira for Mac / Avira for PC)
Back up Your Computer
All Hamilton-owned computers have the backup software, CrashPlan installed (http://www.hamilton.edu/offices/lits/rc/viewing-backups-and-restoring-files-in-crashplan).
The LITS Help Desk recommends using either Firefox or Chrome as they are updated more frequently.
Additionally, install an ad blocker to minimize your exposure to ads and other online threats.
- uBlock Origin has multiple 3rd party filters that can be toggled on. (uBlock Origin- For Firefox / For Chrome)
The Internet and social media brings with it a whole new way to connect with friends and strangers the world over. Not everyone is who they say they are, or, may behave differently when behind the glow of a computer screen.
Hamilton tries to educate its students, faculty and staff about the caveats and disconnects that come with a connected world.
Secure your Smartphones, Tablets, Laptops and other devices with a password/Pin code. Activate the “Find my phone/device” feature. (iOS)
Every new computer is equipped with a firewall that is automatically turned on and should be kept on.
Hardware firewalls are used at Hamilton to protect the borders between the Internet and the campus network and also between the campus network and the data center. Firewall software is also configured on Hamilton's servers.
Create and use complex passwords. Do not share passwords. Using strong passwords is the first step in online security.
How do we make a strong password we can remember and don't have to write down? Learn More
Phishing attacks are designed to steal your passwords or other personal information and can even be used to spread viruses and install malware on your computer. If you see something, say something!
They will often:
- come from someone you know
- contain convincing logos from companies with whom you have communicated
- ask you to click on something
Check the links to make sure they go to the address you'd expect them to go to, and check the sender address as well. Be suspicious of any message you receive that you weren't expecting.
IF an email seems suspicious, contact the Help Desk at email@example.com or 315-859-4181.
The Security Education and Training Awareness (SETA) program includes phishing campaigns aimed at continually exercising the awareness education of each staff and faculty member to successfully identify and avoid phishing messages.
Securing Your Network Connection
Hamilton provides tools to protect computers and network resources from unauthorized and unwarranted access. Systems which are not equipped with updated patches and antivirus are vulnerable to network attacks. To help prevent this, Hamilton requires that each computer meet a baseline security configuration before connecting to the network.
Topics covered in the Information Security Awareness training include current cyber attacks, relevant policies, how to avoid compromising data through phishing, Internet security, mobile devices and wireless connections.