|One Step Ahead:Security Starts With You
August 27, 2013,
Volume 60, No. 2
Another tip in a series provided by the Offices of Information Systems & Computing and Audit, Compliance & Privacy.
By now, most of us are familiar with news stories about lost or stolen computers and cell phones, individuals being tricked by hackers into providing their passwords or opening malicious files, or the spread of sensitive or proprietary company information onto personal devices. These examples have something important in common. They highlight the central role each of us plays in helping to ensure the security of devices and data.
Here are three tips for effective security and privacy protections:
First and foremost, know where to get help. At Penn every member of our faculty, staff and student body has a designated Local Support Provider (LSP). Your LSP will know the most about your specific needs and environment, and is therefore the best person to talk to first with any IT questions—including those related to data security or privacy. Look here to find your LSP: https://secure.www.upenn.edu/computing/resources/content/get-it-help
Know the data you work with and any special rules that apply. Law and Penn policy may, for example, require special security protections and limits on sharing. Special rules may apply depending on the sensitivity and type of data you are working with, such as HIPAA-protected health information, FERPA-protected student data, Social Security numbers, alumni data, email and other electronic files, applicant data and more. For information on such requirements, visit http://www.upenn.edu/privacyFor questions, contact the Privacy Office at firstname.lastname@example.org
Take advantage of free tools and published best practices. ISC’s Office of Information Security makes available a number of resources to help you secure your systems and data, including free anti-virus software for your work and personal computers, Penn+Box for collaboration and file storage, and “Top 10” tips for securing computers and mobile devices (see www.upenn.edu/computing/security/checklists/Top10/). For assistance with these resources (and many more) contact email@example.com
For additional tips, see the One Step Ahead link on the Information Security website:www.upenn.edu/computing/security/