IT Security and Resources
Best Practices for Securing Campus Information
1. Protect passwords. Do not share sensitive data and do not share your password. Store passwords in a
secure and encrypted environment like Password Gorilla, which is already installed on all ASU employee
computers.
2. Think before you click. Email is the most effective way for criminals to deliver malware to an unsuspecting
victim, but text-based threats are on the rise as well. Do not open email attachments or click on links in
emails, text messages, chat boxes, etc. from people you do not know – and be suspicious of links sent from
those you know as well.
3. Avoid ransomware. Ransomware is a type of malware that accesses a victim’s files, locks and encrypts
them and then demands the victim to pay a ransom to get them back. To educate yourself about
ransomware, check out How to Prevent and Recover from Ransomware.
4. Lock your computer workstation when stepping away. When leaving your desk, make sure to lock your
computer. Doing so will help protect student and employee records, financial information, and other
confidential documents.
5. Maintain a clean workspace. Physical security is a critical and sometimes overlooked aspect of
cybersecurity. Check out these 11 “messy desk” mistakes that could leave the university and our students’
data at risk and then review these tips for maintaining a clean workspace.
6. Safeguard your devices. Mobile devices–including smartphones, laptops, and tablets–are used to access
and store personal and private information, so be sure to properly manage and secure mobile devices
before working with sensitive university data. This minimizes the risk to university data as well as to your
personal information. That's good for you, and it's good for ASU.
Cybersecurity Awareness Video Series
For more information about how to protect yourself and the university, check out this video/blog series from the
National Cybersecurity Alliance (NCSA):
● Episode 1: Passwords - video
● Episode 2: Data Handling - video
● Episode 3: Computer Theft - video
● Episode 4: Phishing and Ransomware - video
● Episode 5: Removable Media - video
● Episode 6: Vishing - video
● Episode 7: Internet Downloads - video
● Episode 8: Wi-Fi - video