Protecting Data

Protecting Yours and University Data

One of the biggest threats in cybersecurity is the loss of data. Not knowing the intention of the individual that steals information can become a nightmare. Protecting online data is simple and can be easily done. Here are some examples of steps you can take to protect your data.

  • Do not save your credit card or personal information in your browser.
  • Think before you text/email any Personal Identifiable Information or (PII).
    • Does the other party need the information?
    • Could this information be misused if someone with malicious intent got ahold of it?
  • Avoid using the same password for multiple accounts to reduce risks.
  • Avoid clicking on popups or links even if they look legitimate. They could be fake:
    • Check if the link has a secure internet browser address (https) on the pop up and your browser should not display any virus alerts.

This week we will also be doing a scavenger hunt. In this we will have you search SecureIT website and find some useful information to help protect your data online.

Play This Week's Activity!

Data Classification:

Not all data is created equal. Some are more sensitive than others and need to be kept confidential no matter if it is yours or others. Some data are restricted by law due to privacy and security reasons.  Have you heard of FERPA, HIPAA, COPPA and GDRP? These are all laws to regulate organizations to protect privacy.  Here are the details on Data Classification Standards.  KSU Employees: Please explore our SharePoint Site to learn more about Data Classification Standards and Data Governance.

Backing Up Your Data:

It is a good practice to regularly back up important data and to delete or offload anything that is not necessary. There is the 3-2-1 rule for backing up data.

       3  Copies of your data should be kept.

       2  Different types of storage.        

       1  Copy kept somewhere off site, like the cloud.

Safe Email Practices:

Ever since the first email was sent back in 1971 it has been one of the most used methods for communicating and distributing information for many purposes. Here are some good rules to follow when sending an email.

  • Avoid sending any sensitive information in your email.
    • This includes information such as your credit card information, PII, and FERPA.
  • If you absolutely must send out sensitive information:
    • Make sure the person receiving information really needs it, verify person and their email.
    • Encrypt sensitive information to make sure the content is secure and safe.
    • Don’t ask for sensitive info in a mass email.
    • If sensitive information is requested in massive chain email, please inform the sender if it is a mistake and don’t reply to ALL.  

 

For questions, please email security@kent.edu or visit https://www.kent.edu/it/secureit

#BeCyberSmart #CyberSecurity 
Text

Description automatically generated