By Meghan McCoy, English, '18
Protecting your device includes both physical and digital security.
We’ve written about preventing theft and registering your computer with Tech Services so we can help find it if it is stolen. But what can you do to protect your device from hackers, prying eyes, viruses, and other digital threats?
Follow the tips below to help protect your device and control your online presence.
Security is a team effort. All of us play a part in making the internet as safe as we possibly can. Why not do so while earning course credit?
Some students have taken advantage of an internship opportunity within Technology Services. In 2016, Tech Services partnered with the Department of Computer Science to offer an independent study where students spend a semester working with Tech Services Security, building their knowledge and resumes, and earning course credit at the same time.
Stacks of exams and papers, spreadsheets full of grades, and empty coffee cups.
These three things are connected. They’re certainly all part of midterms season here at Illinois. If you teach, chances are you’ve experienced at least two of these three things this week.
They also take up a lot of space. Exams and papers are returned and coffee cups are recycled. But where do the spreadsheets go?
There are a lot of ways to protect your data. For those who choose to store files on their local hard drive, a strong password is the first line of defense against threats. That helps prevent people from accessing your files, but there’s more you can do.
Encrypting your hard drive is a second way to guard your files and data from prying eyes. It’s fast and it’s easy! Basically, encryption scrambles your data, and only the person with the correct “key” (think password/passphrase) can put that puzzle together again.
Data breaches, where personal information, credit data, or health information is disclosed, are all too common. The results of these breaches could include fines, legal costs, bad publicity, and most importantly, increased risk and loss to individuals impacted.
The University of Illinois, through its research, education, and business operations, stores much of this High Risk data. This means we are under constant attack and threat. So how does the University manage the threats and secure its data?
There used to be one option for storing your data. Your local hard drive. External hard drives hadn't been developed yet, and the cloud hadn't even been considered. Now, people have to decide multiple times a day, where to store certain data.
A lot of factors go into where you store your data. We'll take a look at a number of questions you should ask yourself before you store data, but first, let's look at some of the benefits and risks of each store type.
Think about the amount of data you have. Financial information, medical records, photos, music, movies, academic work...those are all basic, but what about the other data do you have that you probably don’t think about?
What you shop for, how much time you spend on a given website, your location, your inner-most thoughts and feelings that are now publicly shared on the web via social media. It can be quite scary to think about all of the information we share about ourselves, willingly or not.
500 million. 68 million. 32 million.
That’s how many accounts have been hacked at Yahoo, Dropbox, and Twitter, respectively, in the past couple years...and that’s just the tip of the iceberg. Fraud, stolen identities, stolen credentials. They're all incredibly common.