Supporters assemble just past the 100-foot perimeter surrounding polling places to wave signs and loudly tell all who can hear how to vote. Information available at Google Apps Security.That was the street wisdom coming from a young woman waving a campaign sign for the “A” team Tuesday morning on a lively stretch of Hudson Avenue.Įlections in Hudson County just seem different. Also, if you share copyrighted files, you risk being disconnected from the campus network, as well as serious legal consequences. Filesharing also opens your computer to the risk of malicious files and attackers. Improperly configured filesharing software can allow others access to your entire computer, not just to the files you intend to share. Also keep in mind that once you post something online, it can be very difficult to “take it back.” Even if you delete the information, copies can still exist on other computers, web sites, or in search engines.įile-sharing Be extremely careful with file-sharing software (BitTorrent, Limewire, etc.).Seemingly innocent information about your interests, family, or history could be used by hackers for identity theft, or by stalkers or social engineers.A good rule of thumb is to only post information you would be willing to put on a banner displayed in a public place.Assume that anything you post to these websites is public and could potentially be used against you. Do not reveal personal details or confidential info online.Social networking sites (such as Facebook and Twitter), personal web pages, and blogs are notorious as public sources of personal information and uncensored opinions. Emails containing sensitive information should be deleted securely. Delete email and attachments when you no longer need them.This protects the email addresses of the recipients by hiding them and makes your email easier to read. Use the “Bcc” (blind carbon copy) line for large numbers of recipients.This avoids the data being downloaded by the recipients. If you receive P3-P4 data via email, keep it for the shortest amount of time possible and delete it securely. These are not secure methods of communication. Never assume that email, instant messages (IM), texts, or attachments are private or confidential. Don't send P3-P4 data or sensitive information via email or instant message (IM). P rotecting Information in Email and IM/Texts See the “Mobile Device and Wireless” page for more information.Set devices to “ask” before joining new networks so you don’t unknowingly connect to insecure wireless networks.Alternatively, use a virtual private network (VPN) or network encryption from off campus., like UCSC's Campus VPN.EDUROAM SECURE WIRELESS is encrypted - available to UCSC students, researchers, faculty, and staff.Only use known, encrypted wireless networks when working with sensitive information. Information and passwords sent via standard, unencrypted wireless are especially easy for hackers to intercept (most public-access wireless, including UCSC-Guest, is unencrypted). Even unlinked web pages can be found.īe especially careful about what you do over wireless. Don’t put sensitive information in locations that are accessible from the Internet.Remember that links and web sites that look legitimate can really be bogus sites designed to steal information or infect your computer.Don’t click or cut and paste links in unsolicited emails. Get to web sites by typing the web address indirectly.At a minimum, look for “https” in the URL to indicate that there is a secure connection.Don’t provide personal, sensitive, or confidential information online unless you are using a trusted, secure web page.Don’t give private information to anyone you don’t know or who doesn’t have a legitimate need for it.(Back to "How to Stay Secure" page) What should you do? See “ Beware of Scams” for additional information about protecting yourself.Information that you post online may be more public than you think.Information sent over the internet or by email is not necessarily secure. Make sure you know where you’re going before clicking on a link or opening something.
0 Comments
Leave a Reply. |