IT Security and Resources

Best Practices for Securing Campus Information

1. Protect passwords. Do not share sensitive data and do not share your password. Store passwords in a

secure and encrypted environment like Password Gorilla, which is already installed on all ASU employee

computers.

2. Think before you click. Email is the most effective way for criminals to deliver malware to an unsuspecting

victim, but text-based threats are on the rise as well. Do not open email attachments or click on links in

emails, text messages, chat boxes, etc. from people you do not know – and be suspicious of links sent from

those you know as well.

3. Avoid ransomware. Ransomware is a type of malware that accesses a victim’s files, locks and encrypts

them and then demands the victim to pay a ransom to get them back. To educate yourself about

ransomware, check out How to Prevent and Recover from Ransomware.

4. Lock your computer workstation when stepping away. When leaving your desk, make sure to lock your

computer. Doing so will help protect student and employee records, financial information, and other

confidential documents.

5. Maintain a clean workspace. Physical security is a critical and sometimes overlooked aspect of

cybersecurity. Check out these 11 “messy desk” mistakes that could leave the university and our students’

data at risk and then review these tips for maintaining a clean workspace.

6. Safeguard your devices. Mobile devices–including smartphones, laptops, and tablets–are used to access

and store personal and private information, so be sure to properly manage and secure mobile devices

before working with sensitive university data. This minimizes the risk to university data as well as to your

personal information. That's good for you, and it's good for ASU.


Cybersecurity Awareness Video Series

For more information about how to protect yourself and the university, check out this video/blog series from the

National Cybersecurity Alliance (NCSA):

● Episode 1: Passwords - video

● Episode 2: Data Handling - video

● Episode 3: Computer Theft - video

● Episode 4: Phishing and Ransomware - video

● Episode 5: Removable Media - video

● Episode 6: Vishing - video

● Episode 7: Internet Downloads - video

● Episode 8: Wi-Fi - video