Tip #2: Securing Devices at Home & Work
The year 2020 presented a major disruption in the way many work, learn, and socialize online. Our homes are more connected than ever. The University has expanded its network connections more than ever too. With more people now working from home, these two internet-connected environments are colliding on a scale we’ve never seen before and introducing a whole new set of potential vulnerabilities that users must be conscious of. Tip #2 of Cybersecurity Awareness Month will focus on steps users can take to protect internet-connected devices for both personal and professional use.
The University’s data safety and security is a responsibility we all share. As the lines between our campus and personal lives have almost disappeared, it is critically important that exercising smart cybersecurity hygiene flows between the two.
Facts and Figures
* The global smart home market is forecast to reach a value of more than $141 billion by 2023. (Statista Research)
* 90% of IT professionals believe remote workers are not secure and 70% think remote staff poses a greater risk than onsite employees. (OpenVPN)
* Get Savvy About WiFi Hotspots: Public wireless networks and hotspots are not secure, which means that anyone could potentially see what you are doing on your laptop or smartphone while you are connected to them. Limit what you do on a public WiFi and avoid accessing sensitive accounts like email and bank accounts. If you must connect, use a virtual private network (VPN) or personal/mobile hotspot for a more secure connection.
* Lock Down Your Login: Create long and unique passphrases for all accounts and use Two-factor authentication (2FA) wherever possible. 2FA will fortify your online accounts by enabling the strongest authentication tools available, such as biometrics or a unique one-time generated code sent to your phone or mobile device.
* Think Before You Click: If you receive an enticing offer via email or text, don’t be so quick to click on the link. Instead, go directly to the company’s website to verify it is legitimate. If you’re unsure who an email is from – even if the details appear accurate – or if it’s looks phishy; do not respond, click any links, or open any attachments because they may be infected with malware.
Please watch the video highlights the Do’s and Don’ts of phishing attacks: https://youtu.be/D_yAYhjNE-0
Please click on the link for more information on cybersecurity: https://jcu.edu/its/security/ncsam
Information Technology Services