Information Security Reminders
ITS wants to remind everyone that cyber attackers take advantage of this situation and to scam you or phishing attacks that attempt to get you to click on malicious links or open infected attachments.
Remember that information security should be adhered to, no matter where you work. Refer to the ITS Security Policy .
Quick Tips to Protect Your Home Network
- The most effective steps you can take to secure your wireless network at home are:
- Change the default admin password
- Enable WPA2 encryption
- Use a strong password for your wireless network
- Be aware of all the devices connected to your home network, including baby monitors, gaming consoles, TVs, appliances or even your car. Ensure all those devices are protected by a strong password and/or are running the latest version of their operating system.
- One of the most effective ways you can protect your computer at home is to make sure both the operating system and your applications are patched and updated. Enable automatic updating whenever possible.
- Ultimately, common sense is your best protection. If an email, phone call or online message seems odd, suspicious or too good to be true, it may be an attack.
- Make sure each of your accounts has a separate, unique password. Can't remember all of your passwords/passphrases? Consider using a password manager to securely store all of them for you.
- Phishing is when an attacker attempts to fool you into clicking on a malicious link or opening an attachment in an email. Be suspicious of any email or online message that creates a sense of urgency, has bad spelling or addresses you as "Dear Customer." Here are some of the most common indicators that the urgent phone call or email you received is most likely a scam or attack.
- Any messages that communicate a tremendous sense of urgency. The bad guys are trying to rush you into making a mistake.
- Any message that pressures you into bypassing or ignore our policies and procedures.
- Any message that promotes miracle cures, such as vaccines or medicine that will protect you. If it sounds too good to be true, it probably is.
- Be very suspicious of any phone call or email that pretends to be an official or government organization urging you to take immediate action.
- Keep in mind these attacks can happen at work or at home, via email, text messaging or even over the phone.
- Don’t fall victim to bad guys playing on your emotions. If you feel you have received an attack at work, simply delete it or if you have concerns, report it to the ITS Service Desk.
- Make sure family and friends understand they cannot use your work devices, they can accidentally erase or modify information, or, perhaps even worse, accidentally infect the device.
This is also a great opportunity to reinforce our cyber-security awareness, take the time if you haven’t already done so, and take LMU’s Information Security Awareness Training Program via Brightspace. Login to MyLMU > click the Brightspace icon on the home page.
You can also visit the ITS Information Security site (https://its.lmu.edu/secureit/), where you can find additional tips and cyber-security information.