![]() ![]() These can harbor behind-the-scenes computer viruses or open a “back door” giving others access to your computer without your knowledge. Don't install unknown or suspicious programs on your computer.This can open your computer up to attackers. Free software and additional information.Don’t open files sent via chat/IM or P2P software on a machine that contains sensitive data – these files can bypass anti-virus screening.Don't click on unknown or unexpected links or attachments.Install anti-malware software and make sure it is always up-to-date.Out-of-date anti-malware may not detect known malware, leaving your computer vulnerable to infection. Make sure all systems connected to the network/Internet have all necessary operating system (OS) and application security “patches” and updates.Ĭomputer infected with a virus or other malware:Ĭomputers that are not protected with anti-malware software are vulnerable. This puts all of the data on those system and other connected systems at risk. Hackers can take advantage of vulnerabilities in operating systems (OS) and applications if they are not properly patched or updated. See UCSC’s Password Strength and Security Standards.Change initial and temporary passwords, and password resets, as soon as possible whenever possible.Have a unique password for each account.Use different passwords for work and non-work accounts.Never share or reveal your passwords, even to people or organizations you trust.Use good, cryptic passwords that are difficult to guess, and keep them secure.This can lead to compromised data, compromised systems, and people using your accounts without your knowledge. Don't send paper mail that displays a person's Social Security number, financial account information, or Drivers License/State ID number.Don’t forget about sensitive data in attachments, screen shots, test data, etc.Don’t email or IM (instant message) unencrypted sensitive data.Don't use open/unencrypted wireless when working with or sending this data.This includes remote access and client/server transmissions. Always transmit sensitive data securely.If you can access it online without a password, so can others. Be certain you don’t put sensitive information in locations that are publicly accessible from the Internet.Be sure you know who has access to folders before you put sensitive data there!.Files containing SSNs generated by a web form stored in the same publicly-accessible directory as the web form.Saving files containing PII or protected student data in a web folder that is publicly accessible online. ![]() This puts data at risk should it be intercepted while in transit. PII, protected student records, or financial data being emailed in plain text, or sent in unprotected attachments.Insecure storage or transmission of PII and other sensitive information: Local authorities should also be contacted if the incident occurs away from campus. ![]() Be sure to let them know if the stolen equipment contains any sensitive information. Report suspected theft of UCSC-related computing equipment to the UCSC Police Department. For information on how to securely delete files, see PC/Mac, or email) Securely delete personally identifiable informationn (PII) and other sensitive data when it is no longer needed for business purposes. Minimizing the amount of sensitive data stored reduces risk in the case of theft.
0 Comments
Leave a Reply. |