Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 39 Next »

Purpose

Keeping your system secure is essential to maintaining productivity, protecting data and intellectual property, and abiding by University and partners' policies and requirements. 


Audience

FACULTY RESEARCHERS ADMIN STAFF IT STAFF STUDENTS


On this page

 Expand to see table of contents

Initial considerations

Evaluate possible institutional options.


What can I do? (Top 5)

Set up full disk encryption on your devices.

Establish and follow a backup strategy for your important data.

Install and/or enable end-point protection (antivirus, antimalware, etc.) software.

Keep your devices up-to-date.

Protect devices with unique usernames, strong passwords and/or biometrics.


What else can I do?

Keep an inventory of all devices, data, and services related to your work.

Physically secure your devices and data.

Use secure, encrypted methods to transfer data to and from systems.

Securely destroy data when it is no longer required for your project or subject to retention obligations.

Install ad blocking and/or content filter software.

Notify necessary parties immediately if a device is compromised, lost, or stolen.


  • No labels