Chapter Eight - Technology: Cybersecurity Tips from our Experts

Expert Tips for Reference

Embrace Strong, Unique Passwords

Think of your password like a toothbrush...choose a good one, don't share it, and change it regularly!

  • Use a mix of uppercase and lowercase letters, numbers, and symbols.
  • Consider using a passphrase that's easy for you to remember but hard for others to guess. For instance, BlueSky@MorningCoffee! is much stronger and easier to recall than XgT47!Pq.
  • A password manager can generate a solid and unique options for each of your accounts and securely store them, so you don't have to remember each one. Just make sure to use a reputable provider.

Use Two-Factor Authentication (2FA or MFA)

Adding an extra verification step can be the difference between keeping your accounts safe and giving hackers a free pass. Most services offer 2FA options like a code sent to your phone or generated through an app. It’s like adding a deadbolt to your digital doors.

Spot Phishing Attempts with a Detective's Eye

Phishing is a type of social engineering that involves emails or messages that are to try and trick you into giving away sensitive information. They often look like they're from a legitimate source but usually have telltale signs of being fake, like poor spelling, generic greetings, or urgent requests for information. Always verify the authenticity of requests through known, official channels rather than clicking on links in emails. When in doubt, contact the company directly using a trusted phone number or website. 

A computer keyboard and monitor sitting on a table with papers and notebooks.

Technology Resources

Adjunct Faculty Handbook Home Page

Home page and table of contents

User ID, Passwords & Security, and Email

User Access and Email information and procedures

Internet Use

Permitted and prohibited uses of the Internet (Procedure 7.0170) 

Security Awareness & PODs

Information Technology Security Awareness (Procedure 7.0400) and personally-owned devices (PODs)  

Cybersecurity Tips

Cybersecurity tips from our experts  

More Expert Tips

Keep Your Software Up-To-Date

Regular updates can feel like a chore, but they’re crucial for protecting against known vulnerabilities that hackers exploit. Set your devices to update automatically wherever possible. This includes your operating system, applications, and any security software you’re using.

Be Cautious with WIFI Networks

Public WIFI networks are convenient but not always secure. Avoid accessing sensitive information or making transactions on these networks. If you need to, use a reputable VPN to encrypt your data, making it much harder for others on the network to snoop on your activities or hijack your session.

Understand App Permissions

Before downloading an app, take a moment to read what permissions it asks for. Be wary of apps requesting access to information or functions they don’t need to operate. For instance, a calculator app shouldn’t need access to your contacts.

Educate Yourself on the Basics of Cybersecurity

Knowledge is power. Take the time to learn about different types of cyber threats and the basic principles of digital hygiene. Follow reputable cybersecurity news sources and blogs to stay updated on new threats and security advice. And if your organization offers cybersecurity awareness training, participate actively. This proactive approach helps you adapt to the evolving cyber landscape and protect against emerging risks. Remember, the weakest link in cybersecurity is the end user!

Contact

Faculty Center for Teaching and Learning
407.708.2727 
FacultyCenter@seminolestate.edu