
102 Crisp Hall
The University of Tennessee at Martin
Martin, TN 38238
Local 731.881.7890
Terry Lewis, Interim CIO
helpdesk@utm.edu
Click Here for GPS Direction

|
Top 10 Information Security Best Practices
1) NEVER give out your password to anyone online or over the phone. ITS knows who you are. We will NEVER ask you for your password, neither will your bank, credit card company, social media website, email provider, or any other entity with whom you have login credentials.
2) Be suspicious, do not download any program that you did not specifically seek out to download. Do not agree to a “free virus scan” from a website.
3) Do not click links or open attachments in emails you were not expecting. If you get something from someone you know that looks suspicious, call them and ask if they sent it to you.
4) Update your computer, this includes the operating system, programs, anti-virus/anti-malware programs, browsers, browser plugins, and other software on a regular basis. Most will notify you when updates are available.
5) Schedule regular anti-malware scans of your computer, weekly at least.
6) Use encrypted wireless networks whenever possible, using the WPA or WPA2 type encryption. If on unencrypted wireless networks, make sure you are on an HTTPS site if entering login credentials.
7) Backup your critical data to a file server, USB drive, or other means of protecting the data against computer hardware failure.
8) Lock your computer when you walk away from it. In Windows it’s as simple as holding down the “Windows” button and pressing the “L” key. On a Mac, setup a “hot corner” where you can drag your mouse to engage your screen saver. Always use a screen saver password.
9) Be careful of the social media apps you use. On several occasions, malicious Facebook apps have been developed that spread malware to your computer, steal your Facebook login credentials, and spread themselves to all of your “friends” in Facebook.
10) Never send Social Security Numbers, credit card numbers, completed tax forms, or other personally identifiable information through unencrypted email. It can be intercepted and used to steal your identity.
|















