1 - You are a hacker's target.
Never say to yourself, "It won't happen to me." We're all in danger, and the stakes are high - both for your personal and financial well-being, as well as for the university's credibility and standing.
All is responsible for cybersecurity.
You will help protect yourself and others by following the tips below and being alert.
2: Make sure the program is up to date.
It's important to keep the operating system and services up to date. Always make sure your devices have the most recent security updates:
Set the operating system's automatic updates to on.
Use web browsers that receive regular, automatic security updates, such as Chrome or Firefox.
Make sure your browser's plug-ins (Flash, Java, and so on) are up to date. Visit nextdoorsec.com to know about cybersecurity attacks and prevention tips.
3: Be wary of phishing scams and suspicious emails or phone calls.
Phishing scams are a constant threat; cybercriminals will try to trick you into divulging personal information such as your login ID and password, banking or credit card information, using various social engineering(link is external) ploys.
Phishing scams can be carried out via phone, text, or social networking sites, but email is the most popular method.
Any official-looking email or phone call requesting personal or financial details should be avoided.
For more information on phishing scams and how to protect yourself, visit our Phishing Resources section.
4 - Make good password management a habit.
We all have so many passwords to keep track of, and it's all too tempting to take shortcuts like reusing the same one. A password manager will help you keep all of your accounts' passwords strong and exclusive. These programmes will create strong passwords for you, automatically enter credentials, and remind you to change your passwords on a regular basis. All CalNet ID holders are eligible for free LastPass Premium(link is external).
Protecting Your Credentials is a how-to article that includes comprehensive advice about how to keep your password secure.
5: Be cautious about what you click.
Avoid going to unfamiliar websites or installing software from untrustworthy sources. These sites often contain malware that will secretly instal and hack your device.
Do not click on any attachments or links in the email if they are unexpected or suspicious for any reason.
Click-to-Play(link is external) and NoScript(link is external), browser add-on features that prevent the automatic download of plug-in content (e.g., Java, Flash) and scripts that may contain malicious code, are recommended by ISO.
6 - Always keep an eye on your computers.
Your devices' physical protection is just as critical as their technological security.
If you must leave your laptop, phone, or tablet for an extended period of time, make sure it is locked so that no one else can access it.
If you store sensitive information on a thumb drive or external hard drive, make sure it's encrypted and locked.
When you're not using your desktop computer, lock it or shut it down.
7. Safeguard Protected Data
Be mindful of any Protected Data you come into contact with, as well as the limitations that come with it. To learn more about data security levels, look over the UCB Data Classification Standard. Generally speaking:
Keep high-level Protected Data off your workstation, laptop, or mobile devices (e.g., SSNs, credit card information, student records, health information, etc.).
When you no longer need confidential data files, securely delete them from your device.
When storing or sharing confidential information, always use encryption.
Are you unsure how to store or treat confidential information? Please contact us at security@berkeley.edu (link sends e-mail).
8: Be cautious when using mobile devices.
You'll want to make sure you're safe, given how much we depend on our mobile devices and how vulnerable they are to attack:
Use a PIN or password to secure your computer, and never leave it unattended in public.
Download applications only from reputable sources (Apple AppStore, Google Play).
Keep the operating system of the computer up to date.
Unsolicited emails or messages do not contain links or attachments.
Personal information should not be transmitted or stored on the computer.
Data encryption is available on most handheld devices; check your device's documentation for more details.
To help avoid loss or theft, use Apple's Find My iPhone(link is external) or Android Device Manager(link is external) software.
9: Secure your computer with anti-virus and anti-malware software.
Download these programmes only from a reputable and well-known source. To ensure that your programmes remain successful, keep virus definitions, engines, and software up to date.
For more detail, see our Anti-Malware Software Guidelines with Minimum Security Standards.
10: Make a backup of your files.
Regularly back up your data - the only sure way to patch your device after a security breach is to erase and reinstall the operating system.