Hackers, malicious actors, and thieves may be working remotely, but they’re as obnoxiously active and dangerous as ever. In fact, cybersecurity experts have seen a strong uptick in attacks during the past several weeks.
Working remotely means you’re outside many of the safeguards provided by the IU network. So, to keep your system and data secure, you’ll need to assume more of the responsibility for cybersecurity.
The good news is that you don’t need to be a technical expert to make the computer at your home office harder to hack. Here are a baker’s dozen tips to make your system and your data more secure. As always, if you need help contact your IT Pro or campus UITS Support Center.
Keep it current! Be sure all software, especially your antivirus software, is current. For Mac. For Windows.
Beware the phish! Be extra cautious about possible phishing emails when accessing these links from home since IU cannot protect you by blocking malicious URLs.
Dodge ransomware! To reduce catastrophic ransomware incidents, avoid directly connecting to file servers from your (unmanaged) endpoint; instead, use IUanyWare.
Use the allowed cloud! Use virtualized and approved cloud services when possible (Box, IUanyWare, etc.) to minimize institutional data leakage to personal/home devices. Store your data and documents in approved IU cloud services like Box (for institutional data), Google Drive or Microsoft OneDrive (for personal data) to facilitate sharing and collaboration without storing information on personal devices. Alternatively, store your data on approved file servers and access it only through a secure VPN connection.
Lock it down! Set secure passwords, codes, or screen locks for all devices so information can’t easily be accessed if the device is lost or stolen. Set up a locking screen saver or session timeout to discourage other family members from accessing your IU session when you walk away from your computer.
Back it up! Routinely back up important data to a secure location (possibly an approved cloud storage service), and routinely test those backups.
Play to win! Keep gaming activity on a separate account (or, preferably, a separate computer) that does not have access to the cloud drives or your personal account files.
Build a Zoombomb shelter. There’s a new kind of troll on the internet, and it’s just waiting to disrupt your Zoom meeting. Secure your Zoom meeting with these tips.
Sharing is not caring! Avoid sharing computers among family members, but if it must be done, use a separate account for each family member and a separate account for administrative tasks on the system.