Secure Practices

  1. Be alert to phishing scams in email, Web or social networking sites. Any request for your personal account information that is made electronically for any service you use should be completely ignored. Many emails will try and convince you that if you do not respond, you will lose your account or another event of similar nature. NEVER give your account information out in an email or online, unless it is a secure website (https://somewhere.com) that is trustworthy.
  2. Install Anti-Virus & Anti-Spyware and keep it updated...Anti-Virus and Anti-Spyware is only effective when it is regularly updated. Read more

  3. Don’t use ACU usernames and passwords for non-ACU accounts…It may be convenient to use one username & password for everything, but once it has been compromised, the university becomes vulnerable.  Read More

  4. Lock or Log out your workstation when you leave the office…One of the easiest ways to bypass security measures is to have physical access to a computer that is logged into the network. Read More

  5. Secure the office when you are away…If someone is willing to dumpster dive for information, we can infer that they are also more than eager to rifle through a desk or file cabinets. Read More

  6. Encrypt sensitive data…Using a method to lock sensitive data so others cannot open it, even if they retrieve or intercept the data diminishes the value of the data because it can not be accessed. Read More

  7. Back up your computer files regularly….so you don’t lose important assignments, cherished music or photos.  Keep backed up files in a safe, secure location away from your computer (or use an online service).

  8. Use different passwords for all online accounts. Secure passwords are long and complex (at least 9 characters, NOT single words, pet names, birthdays, etc.) and include numbers and symbols.

  9. Pack it up and take your laptop with you, even if you intend to be right back. Unattended laptops in public places like the library, study lounge, and coffee shops are an invitation for theft or unwanted access to your information.

  10. Be cautious about your information on Social Network sites…like Facebook, MySpace, and Twitter. The more information you post, the easier it may be for a hacker to use that information to steal your identity or access your data.
Mobile-Help-Site
Connect Online