Multi-factor Authentication |
Your Password is your Key |
Stay Current |
Double your login protection. Enable MFA to ensure that the only person who has access to your account is you. Use it for email, banking, social media, and any other service that requires logging in. |
According to expert guidance, you should consider using the longest password or passphrase permissible. Don’t reuse your STU password. Use a Password Manager, when available. |
Keep your security software, web browser and operating system updated to the latest version available. |
Be hard to get |
Be App Aware |
Beware “Free” Wi-Fi |
Cyber criminals use phishing tactics, hoping to fool their victims. If you’re unsure who an email is from or if the email looks “phishy,” do not respond and do not click on any links or attachments in that email. Contact ITS if in doubt. |
Check your app permissions and use the “rule of least privilege possible”. Delete what you don’t need. Just say “no” to privilege requests that don’t make sense. Only download apps from trusted vendors and sources. |
Avoid sensitive activities (e.g., banking) that require passwords or credit cards. Your personal hotspot is often a safer alternative to free Wi-Fi. Only use sites that begin with “https://” when online shopping or banking. |
Travel Safer #1 – Back up |
Travel Safer #2 – Lock It |
Travel Safer #3 – Know Who |
Back up your mobile device data to another device or cloud service in case your device is compromised lost or stolen. |
Lock your device when you are not using it. Even if you only step away for a few minutes, that is enough time for someone to steal or misuse your information. |
Devices may automatically seek and connect to available Wi-Fi networks or Bluetooth devices. Disable these features so that you actively choose when to connect to a safe network. |
Protect everyone’s PII |
We are Human |
Speak Out |
Business information often includes a mix of personal and proprietary data including employee personally identifiable information (PII). Do not share PII, without permission, or by insecure means. |
Technology has its limits. As “smart” technology evolves, it is important to remember that security measures only work if we all use them correctly. |
If you believe that you have become a victim of cybercrime, immediately notify STU ITS to. Keep and record all evidence of the incident and its suspected source. |