Information Technology

Information Security

What is data security and why should we care?
Data security is keeping electronic devices and the information stored on them "safe". Otherwise, identity theft, financial ruin and blackmail could happen to you.

7 Practices for Safe Computing 5 Terms in Safe Computing Top 10 Bad Computing Practices
  1. Protect your personal information. Anyone can be a victim of identity theft. Do not share your social security number, bank account number, or credit card number unless you are absolutely sure that you are on a secure site that you know can be trusted.
  2. Protect your passwords. Never share your passwords with anyone.
  3. Use anti-virus software and a firewall, and update both regularly.
  4. Update your operating system and web browser regularly.
  5. Back up important files.
  6. Learn how to recognize phishing, scams, spyware, malicious email attachments and links.
  7. Learn who to contact if something goes wrong. Your friendly FLC IT department can help point you in the direction. Just call 247-7444 or email askIT@fortlewis.edu
  1. Phishing: The criminally fraudulent process of attempting to acquire sensitive information such as usernames passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication.
  2. Virus: A computer program that can copy itself and infect a computer without the knowledge of the user.
  3. Spyware: Computer software that is installed surreptitiously on a personal computer to intercept or take partial control over the user’s interaction with the computer.
  4. Firewall: A dedicated appliance or software running on another computer, which inspects network traffic passing through it, and denies or permits passage based on a set of rules.
  5. Antivirus software: Computer programs that attempt to identify, neutralize or eliminate malicious software
  1. Not using cryptic passwords that are harder to guess or crack.
  2. Sharing passwords.
  3. Providing personal or sensitive information online on a non secure site.
  4. Clicking on unsolicited web links.
  5. Opening email attachments from unknown senders.
  6. Not locking up portable equipment and sensitive material when you leave.
  7. Not logging off or putting your computer to sleep when you leave. Make sure it requires a password to start up or wake up.
  8. Keeping sensitive information or your only copy of critical data, projects, files, etc., on portable devices. These items are extra vulnerable to theft.
  9. Installing or downloading unknown or unsolicited programs to your computer.
  10. Not making backup copies of files or data that is critical and cannot be lost.
Print