Basic Cyber Hygiene

Overview

Having good habits can help you feel good and show up as your best self. You can do the same with your tech life. Good cybersecurity habits can help make sure you get the best experience when using technology. As cyber threats continue to evolve the cybersecurity basics below will help keep your devices and online accounts secure.

Details / Instructions

1) THE 5 BASICS (FOR ANY DEVICE)

  • Use up-to-date software.
  • Use multi-factor authentication (MFA).
  • Use a VPN, if on public or untrusted wifi.
  • Use a reputable antivirus software.
  • Use secure passwords (and a password manager).

2) COMPUTERS (I.E. LAPTOPS, COMPUTERS)

  • Maintain up to date software.
  • Use a high-quality antivirus software.
    • UR requires the following anti-virus installed on personal devices connecting to the UR network.
      • Windows - Microsoft Defender
      • Mac - Sophos Home for Macs
    • More information at antivirus for personal computers
  • Use multi-factor authentication (MFA) for online accounts.
    • DUO is used for UR devices and accounts.
  • Use secure passwords.
    • UR requires +16 characters with numbers and letters included.
    • random word generator can help to create a password or passphrase.
  • Use a password manager to securely store multiple passwords.
  • Periodically back up your data
    • Maintain a copy of important documents (i.e. documents, photos) on a physical hard drive or the cloud.
    • Keep the backup data in in a secure location.

3) MOBILE DEVICES (I.E. PHONES, TABLETS)

4) AI SECURITY

  • Do not submit UR data that could be confidential or restricted.
    1. Confidential information includes, but is not limited to:
      1. Social Security numbers
      2. Credit and debit card numbers
      3. University ID number
    2. Restricted information includes, but is not limited to:
      1. Education records
      2. Employment records
      3. Financial aid records
    3. More information at Data Classification Standard.
  • More info on how AI will impact UR can be found at AI at UR
  • Of note, you are responsible for any content that you produce or publish that includes AI-generated material.

See Also

For additional cybersecurity questions or issues visit the Information Services (IS) Security website.

 

Print Article

Details

Article ID: 150396
Created
Mon 4/8/24 2:45 PM
Modified
Tue 5/28/24 10:27 AM