National Cyber Security Awareness Month 2015: Weekly Topics

Protect Your Identity
Protect Your Data
Protect Your Devices
Protect Your Reputation

Have you ever had your debit card numbers stolen? Or an online account accessed by someone else without your permission? Occurrences like these cause an uneasy feeling, but there are some simple steps you can take to protect your identity. Having the ability to spot phishing emails, selecting secure passwords, and using multi-factor authentication and password managers are just a few of the easy methods you can use to protect your accounts.

While the prevention of identity theft and unauthorized account access is crucial, it is also important to know how to handle a situation when your identity has been compromised and what you can do to reclaim the sense of security you once had. Visit the resources below to learn more.

Creating & Managing Passwords
Multi-Factor Authentication
Phishing
Identity Theft

Redundancy, redundancy, redundancy! Keeping at least one backup copy of your data could save you from losing the term paper you’ve worked on for months, or the family pictures taken at a memorable gathering. You can choose from several different mediums of backup storage – from online “cloud” storage to portable hard drives, flash drives, or even the old fashion way of keeping it on a CD or DVD.

Some of the most common ways people lose their data is by accidental deletion, malware infections, and hardware failures. Learn how to keep your data safely organized, stored, backed up, and even encrypted by visiting the links below.

Backing Up Your Data
Cloud Services
Data Classification
Encryption

Kill two birds with one stone: protect your devices as a method of also protecting your data. Applying operating system, application, and browser updates can protect your devices from being exploited due to software vulnerabilities. Be sure to keep a trusted antivirus program installed – the Marshall University Office of IT recommends Symantec Endpoint Protection which is free to Marshall University students, faculty, and staff for Windows and Mac devices – and keep its virus definitions up-to-date. Password protect and encrypt your mobile devices, such as laptops, smartphones, and tablets, to protect them if they get lost or stolen. Finally, get savvy about public Wi-Fi hotspots; limit the types of business you conduct and adjust your devices’ security settings to limit who can access your machine.

Applying Updates
Viruses & Malware
Mobile Security
Wireless Security

It seems these days that everyone is sharing detailed aspects of their personal lives on social media – people publicly share their phone numbers, current locations, medical problems, and even what they had to eat today. While some might think this is harmless, it is important to think twice before submitting that post. Who is going to see it? How will others perceive it? Is it safe for a current or future employer to see?

Use the resources below to educate yourself on privacy settings, as well as determining what is acceptable to post on social media and what kinds of information may not be acceptable to share publicly. There is also information on copyright infringement, peer-to-peer file sharing, and alternatives to illegally downloading music, movies, and other media in order to protect your reputation.

Social Media
Copyright Infringement