-
1. Think twice before clicking on links or opening attachments
Even if an email looks like it's from someone you know, take care with attachments. Take that extra second to avoid walking into a digitally dangerous situation. Don't reply to the email because the sender's identity might have been compromised.
-
2. Verify requests for private information
Whenever you are requested to provide private information (yours or anyone else's), verify the identity of the requester — even if it appears to be somebody you know. Con artists are clever in how they collect information to steal information and identities. Even if you think you're safe, regularly check your financial statements and credit reports.
-
3. Protect your passwords
Never reveal your passwords to anyone. Make them long, strong, unique and use multi-factor authentication (MFA) wherever possible.
- Use a password manager such as LastPass or RoboForm.
- Use different passwords for different accounts.
- Use different passwords for work and home.
- Don't let apps and websites remember your passwords.
-
4. Protect your stuff!
Keep a close eye on your belongings when you're in public places. Lock things up or take them with you before you leave, even if you’ll only be away for a second. When you're at work, secure your area and lock your computer screen before leaving your desk. Take your phone and other portable items with you.
-
5. Keep your devices, browsers, and apps up to date
At home, automate software updates and periodically restart your devices to ensure that updates are fully installed. UC Davis Health IT manages workstation updates and restarts.
-
6. Back up critical files
Store backups in a physically separate location from the originals and periodically test them. For critical work files, use storage options that are approved by UC Davis Health IT. For personal files, save a backup on a separate drive (e.g., cloud or encrypted USB) to securely store it.
-
7. Delete sensitive information when it's no longer needed
UC employees should follow the UC Records Retention Schedule that defines the period of time that records should be retained and when they should be destroyed.
-
8. If it's suspicious, report it!
Learn how to recognize suspected scams and other suspicious activities. At work, suspicious emails should be forwarded as attachments to abuse@ucdavis.edu. Report other cybersecurity concerns to the Help Desk: 916-734-HELP (916-734-4357).
Be Cyber-Smart! 8 Habits to Stay Cyber-Safe | Cyber Security (2024)
Author: Rev. Porsche Oberbrunner
Last Updated:
Views: 5914
Rating: 4.2 / 5 (53 voted)
Reviews: 92% of readers found this page helpful
Name: Rev. Porsche Oberbrunner
Birthday: 1994-06-25
Address: Suite 153 582 Lubowitz Walks, Port Alfredoborough, IN 72879-2838
Phone: +128413562823324
Job: IT Strategist
Hobby: Video gaming, Basketball, Web surfing, Book restoration, Jogging, Shooting, Fishing
Introduction: My name is Rev. Porsche Oberbrunner, I am a zany, graceful, talented, witty, determined, shiny, enchanting person who loves writing and wants to share my knowledge and understanding with you.