DO use hard-to-guess passwords or passphrases. A password should have a minimum of 10 characters using uppercase letters, lowercase letters, numbers and special characters. To make it easy for you to remember but hard for an attacker to guess, create an acronym. For example, pick a phrase that is meaningful to you, such as “My son’s birthday is 12 December, 2004.” To use that phrase as your guide, you might use Msbi12/Dec,4 for your password.
DO use different passwords for different accounts. If one password gets hacked, your other accounts are not compromised.
DO use privacy settings on social media sites to restrict access to your personal information.
DO pay attention to phishing traps in email and watch for signs of a scam.
DO destroy information properly when it is no longer needed. Place paper in designated confidential destruction bins throughout the office or use a crosscut shredder. For all electronic storage media, consult with IT.
DO be aware of your surroundings when printing, copying, faxing or discussing sensitive information. Pick up information from printers, copiers or faxes in a timely manner.
DO lock your computer and mobile phone when not in use. This protects data from unauthorized access and use.
DO remember that wireless is inherently insecure. Avoid using public Wi-Fi hotspots. When you must, use LIU provided virtual private network software to protect the data and the device.
DO familiarize yourself with your responsibilities under university policy in regards to acceptable use of IT resources. Review and follow security policies and related standards.
DO report all suspicious activity and cyber incidents to IT. Challenge strangers whom you may encounter in the office. Keep all areas containing sensitive information physically secured, and allow access by authorized individuals only. Part of your job is making sure university data is properly safeguarded and is not damaged, lost or stolen.