Think Before You Click!

Drag to rearrange sections
Rich Text Content

Cyber-Safety Habits

As our reliance on technology grows, so does the demand for stronger online security measures. As a result of forming these eight habits, you'll be more aware of and more prepared for cyberattacks in the future.

Consider the consequences of your actions before you open a file or click on a link.

Even if the sender seems to be someone you know, you should use caution when opening any attachments. Spend a few additional seconds looking around to make sure you're not about to walk into anything bad for your digital health. Because the sender's identity may have been stolen, do not respond to the email in question.

Ensure that any requests for personal information are verified before releasing any information.

Verify the identity of the requester if you are asked to submit private information (yours or someone else's), even if it looks to be someone you know. Con artists are skilled at gathering information to steal both identities and personal information. Keep an eye on your financial accounts and credit reports even if you believe you're in the clear.

Maintain the secrecy of your login credentials.

Make sure no one knows your passwords except you. Make your passwords lengthy, strong, and unique, and use MFA wherever feasible.

Password managers like LastPass or RoboForm may help you stay organised. For each account, use a separate password. Keep the passwords you use at work and at home separate. Don't save your passwords in applications or websites that remember them. If you are concerned about your الأمن السيبراني.

Be on the lookout for threats to your belongings!

When you're out and about, keep an eye on your possessions. No matter how short your absence will be, make sure you secure your belongings or carry them with you. Be sure to lock up your workspace and computer screen before you leave the office. Don't forget to bring your phone and any other small, portable devices.

Update all of your software, including browsers and applications, on a regular basis.

Regularly restart your devices to ensure that software updates are completely deployed while you're not using them. IT at the University of California, Davis, handles workstation upgrades and reboots. You need to keep your أمن المعلومات tight.

Be sure to save a copy of everything important on your hard drive.

Ensure that backups are kept in a different place from the originals and run tests on them on a regular basis. Use UC Davis Health IT-approved storage providers for important business files. Save a copy of your personal data to a safe disc (such as the cloud or an encrypted USB drive).

Then it's no longer required, get rid of private information.

It is the responsibility of UC personnel to adhere to the UC Documents Retention Schedule, which specifies how long records should be kept and when they should be shredded.

rich_text    
Drag to rearrange sections
Rich Text Content
rich_text    

Page Comments