Security Habits Everyone Should Have

Good habits are the foundation of cyber security just like they are for safety and security in the physical world -- like locking your front door or wearing your seat belt in the car. Below are some important cyber security habits to incorporate into your online life. Try to make these habits automatic. They will help protect your information and your work while reduce your risk of getting scammed!

Browse wisely

Set the privacy and security settings on websites to your comfort level for information sharing. It is OK to limit how and with whom you share information.

When you are finished viewing any confidential information online, such as your bank account or student information, close your browser! This is especially true if you are using a computer in a computer lab.

Regularly update system patches, security fixes, and anti-virus software

Keep software current on internet-connected devices to reduce the risk of infection from ransomware and malware. Delete any applications on your computer that you do not use since these are rarely patched and any existing vulnerabilities are susceptible to being exploited. Make sure your computer has the latest patches, security fixes and anti-virus software. Set your computer to have updates downloaded and installed automatically. All HWS issued computers come with ESET anti-virus.

Protect personal information

Information about you, such as purchase history or location, has value — just like money. Be thoughtful about who gets that information and how it is collected by apps, websites and all connected devices.

Also, do not store sensitive data on removable media, like USB flash drives, or mobile devices. Mobile devices and removable media are easily stolen and any sensitive data they hold can be impacted by ransomware or used for criminal activities. Make sure sensitive data, such as social security numbers, passwords, credit card numbers or research data, is always encrypted in transit and in storage.

Don't open suspicious e-mail attachments (phishing)

Many viruses and worms are spread through e-mail files (including web links, file attachments and photos). Links in email, tweets, posts and online advertising are often how cybercriminals try to compromise your information. If it looks suspicious, even if you know the source, it's best to delete or, if appropriate, mark it as junk. If you believe the email is legitimate, verify before you click. Hover your cursor over embedded links to see where they’ll lead you before clicking and do not open any attachments you are not expecting.
Also, do not respond to any email requests for your username, password or personal information. Rowan University will never send you an email message requesting your username and password.

Protect and back up your data

Protect your valuable work, music, photos and other digital information by making an electronic copy and storing it safely. If you have a copy of your data and your device falls victim to ransomware or other cyber threats, you will be able to restore the data from a backup.

Every member of HWS is provided with unlimited storage on Box and OneDrive, powerful tools for collaboration among classmates and colleagues that can be accessed on any device.

Password protect your computer

Adjust your computer’s settings so that a password is required to log on.  For extra security, set the automatic lock to enable after a short period of time. Log off your computer and applications when planning to be away for a longer period of time, and shut it down when it is not in use for an extended period of time, such as overnight. 

 

Need additional help? Contact the HWS IT Services Help Desk.