Protect Your Device

Our devices hold so much personal information these days. Safeguarding our devices can be intimidating. However, from hard passwords to antivirus software, protecting our devices can be simple and easy to maintain.

  • Desktops and Laptops

    General Security Practices For All Systems

    Use good password practices

    Keep your system updated

    • Apply patches, fixes, and service packs, when prompted. Keep your systems upgraded to the latest versions of the software. This usually involves simply restarting your computer when prompted to do so.

    Use antivirus software and your computer's firewall

    Computers that are owned by the college are configured by ITS staff to use appropriate antivirus software and secure firewall rules. Be sure to report to the ITS Service Desk any issues that may arise or messages related to these settings.

    Students should also use appropriate solutions on personally owned devices. A firewall blocks hackers, viruses and other potentially malicious traffic on the internet. Most computers have a built-in firewall that is designed to protect it from attack. To keep your computer protected, make sure your firewall is always turned on. You can check the firewall status of most computers by accessing the Control Panel (or “System Preferences” for iOS users) and checking the security settings. Feel free to bring your computer to the ITS Service Desk for specific advice.

    What are the three ways I can make my computer run faster?

    1. Keep your antivirus software and operating system updated.
      • When your computer asks you to installl updates, allow it to do just that. Updates often fix security issues and optimize certain aspects of your operating system. Because of this, you should install updates as soon as they become available or turn on auto-update.
    2. Delete cookies and temporary files from your internet browser frequently.
      • Temporary web data slows down internet speeds and often causes other internet problems. Find more info about how to clear your browser's cache and cookies in the following knowledge base article:
    3. Limit the programs that run when you start your computer.
      • Even if you are not using the programs, having an excessive number of programs run automatically will slow down your computer. This occurs because the programs are still using resources to run in the background. Learn how to limit startup programs for Windows and Mac computers.

    What is malware, and how do I know if my computer has it?

    Malware includes everything from adware, Trojan viruses, worms, spyware and other malicious programs that are often received from downloaded files, e-mail attachments, or surfing the web. Maintaining antivirus software as described above will help you combat this issue.

    Some common indicators that your computer might be infected with malware:

    • Frequent pop-ups or other problems prevent me from browsing the internet
    • New browser toolbars and web browser crashes
    • My web browser frequently redirects uninitiated
    • My PC recently became much slower or is too slow to use
    • I have new suspicious files
    • Some of my files are encrypted
    • I am warned of a malware infection or I am asked to pay for malware removal
    • My PC frequently crashes

    Avoiding Laptop Theft

    • Never leave your laptop unattended. This includes using your backpack (with the laptop in it) to "save a table" for lunch or leaving your laptop to go use the restroom in the library or lab.
    • Keep your laptop out of sight when you're not using it. Don't leave your laptop on the seat of your car.
    • Be sure your laptop is identifiable. Write down the make, model, and the serial number of your laptop, and take a photo of it for insurance purposes.
    • Use laptop locks when possible.

    Disposing of Computers

    All college-owned devices are properly disposed of by ITS staff using a state-approved recycling vendor. This process includes the appropriate recycling of electronic parts which helps to protect our environment. It also includes proper destruction of hard drives.

    If you're a student, we encourage you to erase your hard drive before discarding your computer. Even though deleting files in your file manager prevents you from seeing them, the data remains on your hard drive. Commonly available forensic tools can easily gain access to this data.

    For personal hard drives, you can gain an extra level of protection by "zeroing out" your data. Apple provides a tool for this for mobile devices. For Windows users, DBAN is a free, though slightly complex, software for this purpose (be sure you create a bootable CD when using DBAN).

  • Mobile Devices

    How Do I Protect My Mobile Devices?

    • Password lock your phone - You should always secure your phone with a unique PIN or password. Never share this password with others.
    • Keep software updated - Smartphones, like computers, often require software updates. These updates provide better functionality and also fix critical security vulnerabilities. You should install these updates as soon as you are notified by your service provider. You can also change your phone’s settings to install updates automatically to ensure you are getting updates as soon as they occur.
    • Only download reputable files from the app store - Downloads from non-official websites are one of the top ways you can become vulnerable to scams, viruses and other unwanted malware. A good rule of thumb is to only download files from an app store or the website of a trusted company, no matter how tempting an application may be. Additionally, you should assess and consider how reputable the app is by looking at the number of downloads, ratings, user feedback, and quick web search of the application to collectively assess the safety of the application.
    • Keep your device with you - Because mobile devices are so portable, one of the biggest threats is loss or theft. Always, keep your mobile device with you or ensure it is locked away safely. Never set it somewhere and walk away, even momentarily.
    • Back up your files - Ensure you are always properly backing up all essential files to another appropriate location.

    Protecting Specific Mobile Platforms

    The FCC article "Ten Steps to Smartphone Security" offers some great tips for protecting your mobile device. Lookout is an Android app available at GooglePlay and provides antivirus and remote wipe features (this feature must be set up before the phone is lost). Apple offers this article about how to find your lost device. Passwords are also very important on your phone; consider using a secure solution to maintain your passwords.

    Disposing of Mobile Devices

    Erase your mobile device before disposing of it. Most mobile phones and tablets have built-in tools for erasing data. Check the device's user guide for instructions.

  • Public Wi-Fi

    5 Tips for Staying Secure on Public Wi-Fi

    1. VPN
      • Any time you are on public Wi-Fi, you should use a Virtual Private Network (VPN) to ensure no one can access your private information. It’s like you’re making sure no one is looking over your virtual shoulder. A VPN provides increased security by encrypting all data sent to and from your computer. Using a VPN is especially important when visiting websites that contain confidential information, such as banking websites.
      • Some college employees are granted access to the college's VPN app to access certain services securely. Check with your supervisor for more information.
    2. What’s in a network’s name?
      • Beware of the "Evil Twin." Confirm the exact spelling of the Wi-Fi network before connecting and do not configure your device to auto-connect to new Wi-Fi hotspots. This will help you avoid slightly misspelled fakes
    3. Skip shopping on public Wi-Fi
      • Avoid typing credit card numbers or other sensitive financial information. Do your online banking or shopping at home, not while on public Wi-Fi.
    4. “S” means secure
      • Remember "S" for security. If you do access a page that requires a login and password, make sure the web site uses "https" in the URL and not just "http". You can easily check this in the address bar of your web browser when you go to a site. Https sites encrypt or convert information into the code to protect the information you may send or receive. But be careful! Some sites drop "https" after you log in, leaving you totally exposed.
    5. Lose the internet
      • Disconnect from the wireless network when working on files that don't require an Internet connection.