Be a Cybersecurity Superhero

Keep Your Devices Updated

Patching your operating system and applications
is critical to keeping your data safe

Backup Your Data

Keep copies of your files on different devices
for fast recovery in case of device failure

Protect Your Identity

Learn the phishing warning signs and never
open email attachments you're not expecting

Guard Your Weaknesses

Use updated antivirus programs to prevent
malware from corrupting your devices

Be a Cybersecurity Superhero

Cybersecurity is everyone's responsibility! It takes everyone maintaining their own systems, files, and data to protect the sphere to sensitive information that surrounds and infuses the University campus and the Auburn Family. Read-up on the topics below to train yourself into a Cybersecurity Superhero.

Keep Your Devices
Updated

We all get them from time to time - those little windows that pop up, notifying us that there are software updates available for our computer. Chances are, these always seem to present themselves right when we are in the middle of doing something seemingly important, so it’s all too convenient to click on that “Remind Me Later” button. Later eventually rolls around, and our little pop-up friend is back once again, nagging us to install these updates and restart our computer. And just like during their last visit, we’re right in the middle of something, and the cycle continues. However, that notification is not there just to pester us. There is actually significant importance in updating our software.

Why Should I Install Updates?

Software updates perform a myriad of tasks. They are available for both our operating system and individual software programs. Performing these updates will deliver a multitude of revisions to your computer, such as adding new features, removing outdated features, updating drivers, delivering bug fixes, and most importantly, fixing security holes that have been discovered.

Operating System update instructions: Windows, Mac, Android, iOS

The Dangers Of Software Vulnerabilities

A software vulnerability is usually a security hole or weakness found in an operating system or software program. Hackers exploit this weakness by writing code to target a specific vulnerability. These exploits can infect your computer with no action on your part other than viewing a website, opening a compromised message, or playing infected media.

Once it infects your computer, this malware can then steal data, allow the attacker to gain control over your computer, and even use software in a way that it was not originally intended. 

So even though these software updates seem like a hassle, think of it as a preventative measure for your Internet safety. Next time that message comes up to update, resist procrastination and go ahead and hit that “Install Now” button.

Cybersecurity CenterContent by Nadia Kovacs

Backup Your
Data

Your data is the most important thing on your computer. Be it family photos, important tax documents, pieces of art, your band’s music, sensitive research papers, or anything else, losing it should simply not be an option. Unfortunately, computers fail, and often. Having a backup plan set before anything goes wrong is one of the most important tasks you will undertake as a responsible computer user.

Method 1: Manually Backing Up Files

The most basic method to back up files is to simply copy/paste them to another resource such as a USB stick, external harddrive, shared network drive, or writeable media. System files should not be backed up. Instead focus on your personal files.

Method 2: Using a Backup Program

There are a number of programs that you can use to assist you and automatically schedule backing up of files to local resources. Mac users should consider using Time Machine.

Method 3: Backing Up to the Cloud

A number of cloud services provide ample secure storage to backup your personal files, such as OneDrive for Business, Box, Google Drive, Drop Box, iCloud, etc. Work-related files should be limited to OneDrive for Business (and Box - coming soon).

Your OneDrive for Business space

Protect Your
Identity

Every day 80,000 people fall for a phishing scam and give away their personal information. Mobile users are particularly susceptible to phishing scams and often overlook some of the warning signs. When you're contacted via email, text, or phone call be on the lookout for these phishing warning signs.

  1. Non-personalized greeting
    Phishing messages usually do not address you by name, but use a generic greeting, such as "Dear User."
  2. Urgent/Threatening language
    Phrases such as “Your account will be terminated if you do not...” are often used to elicit a response.
  3. URLs don’t match and are not secure
    If an email has a link, be cautious. On touch devices, you should long press links to determine the link destination, and on desktops, you should hover over links. Look for the lock and never log into a website that's not secure.
  4. Poor grammar/misspellings
    Most phishing attacks originate from countries where English is not their first language. Use this to your advantage by spotting their errors.
  5. Subject matter does not relate
    If you don't bank at Wells Fargo, don't reply to a message “from” Wells Fargo.
  6. Request for personal information
    The tell-tale sign of a phishing message is the request for personal information, such as your address, social security number, account number, etc.

Latest “Phish Tank” bait

Guard Your
Weaknesses

One of the most common reasons for computer problems is antivirus software not installed, not current, or not running.

Viruses - Your Device's Kryptonite

A computer virus is designed to damages files or steal information on an electronic device.

Types of virus include:

The presence of viruses may be symptomatic by one or more of the following:

Viruses can be spread between computers via portable devices, downloads, and email attachments.

Antivirus Software is Vital AND Required on the University Network!

Not having antivirus on a computer is like inviting a criminal into your home! They then cause havoc or steal from the owner.

Devices on the University network are required to run updated antivirus software.

Install antivirus software