Chapter Eight - Technology: Cybersecurity Tips from our Experts
Expert Tips for Reference
Embrace Strong, Unique Passwords
Think of your password like a toothbrush...choose a good one, don't share it, and change it regularly!
- Use a mix of uppercase and lowercase letters, numbers, and symbols.
- Consider using a passphrase that's easy for you to remember but hard for others to guess. For instance, BlueSky@MorningCoffee! is much stronger and easier to recall than XgT47!Pq.
- A password manager can generate a solid and unique options for each of your accounts and securely store them, so you don't have to remember each one. Just make sure to use a reputable provider.
Use Two-Factor Authentication (2FA or MFA)
Adding an extra verification step can be the difference between keeping your accounts safe and giving hackers a free pass. Most services offer 2FA options like a code sent to your phone or generated through an app. It’s like adding a deadbolt to your digital doors.
Spot Phishing Attempts with a Detective's Eye
Phishing is a type of social engineering that involves emails or messages that are to try and trick you into giving away sensitive information. They often look like they're from a legitimate source but usually have telltale signs of being fake, like poor spelling, generic greetings, or urgent requests for information. Always verify the authenticity of requests through known, official channels rather than clicking on links in emails. When in doubt, contact the company directly using a trusted phone number or website.

Technology Resources
Adjunct Faculty Handbook Home Page
Home page and table of contents
User ID, Passwords & Security, and Email
User Access and Email information and procedures
Internet Use
Permitted and prohibited uses of the Internet (Procedure 7.0170)
Security Awareness & PODs
Information Technology Security Awareness (Procedure 7.0400) and personally-owned devices (PODs)
Cybersecurity Tips
Cybersecurity tips from our experts
More Expert Tips
Keep Your Software Up-To-Date
Regular updates can feel like a chore, but they’re crucial for protecting against known vulnerabilities that hackers exploit. Set your devices to update automatically wherever possible. This includes your operating system, applications, and any security software you’re using.
Be Cautious with WIFI Networks
Public WIFI networks are convenient but not always secure. Avoid accessing sensitive information or making transactions on these networks. If you need to, use a reputable VPN to encrypt your data, making it much harder for others on the network to snoop on your activities or hijack your session.
Understand App Permissions
Before downloading an app, take a moment to read what permissions it asks for. Be wary of apps requesting access to information or functions they don’t need to operate. For instance, a calculator app shouldn’t need access to your contacts.
Educate Yourself on the Basics of Cybersecurity
Knowledge is power. Take the time to learn about different types of cyber threats and the basic principles of digital hygiene. Follow reputable cybersecurity news sources and blogs to stay updated on new threats and security advice. And if your organization offers cybersecurity awareness training, participate actively. This proactive approach helps you adapt to the evolving cyber landscape and protect against emerging risks. Remember, the weakest link in cybersecurity is the end user!
