Academics

ITS Security

Terry Lewis, Interim CIO

102 Crisp Hall

Martin, TN 38238

Ph:

(731) 881-7890

Em:

helpdesk@utm.edu


ITS Security

Academics

Top 10 Information Security Best Practices

  1. NEVER give out your password to anyone online or over the phone. ITS knows who you are. We will NEVER ask you for your password, neither will your bank, credit card company, social media website, email provider, or any other entity with whom you have login credentials.
  2. Be suspicious, do not download any program that you did not specifically seek out to download. Do not agree to a "free virus scan" from a website.
  3. Do not click links or open attachments in emails you were not expecting. If you get something from someone you know that looks suspicious, call them and ask if they sent it to you.
  4. Update your computer, this includes the operating system, programs, anti-virus/anti-malware programs, browsers, browser plugins, and other software on a regular basis. Most will notify you when updates are available.
  5. Schedule regular anti-malware scans of your computer, weekly at least.
  6. Use encrypted wireless networks whenever possible, using the WPA or WPA2 type encryption. If on unencrypted wireless networks, make sure you are on an HTTPS site if entering login credentials.
  7. Backup your critical data to a file server, USB drive, or other means of protecting the data against computer hardware failure.
  8. Lock your computer when you walk away from it. In Windows it's as simple as holding down the "Windows" button and pressing the "L" key. On a Mac, setup a "hot corner" where you can drag your mouse to engage your screen saver. Always use a screen saver password.
  9. Be careful of the social media apps you use. On several occasions, malicious Facebook apps have been developed that spread malware to your computer, steal your Facebook login credentials, and spread themselves to all of your "friends" in Facebook.
  10. Never send Social Security Numbers, credit card numbers, completed tax forms, or other personally identifiable information through unencrypted email. It can be intercepted and used to steal your identity.

Spam Information

Learn to protect your email from spam!

Learn More >

Policies

View the UTM security policies.

Learn More >