Cybersecurity tips while working remotely

Cybersecurity tips while working remotely

With classes online and many people working remotely, virtual communication has become the way we stay connected to each other. This also means it’s important to take cybersecurity precautions to keep yourself safe and secure, so we wanted to share some tips with you.

Zoom

Image of Zoom logo on a phone with a lock on right side of the image.

Zoom has many features that you can utilize to keep your meetings protected from those who may want to disrupt them. This includes creating a randomly generated Meeting ID or using a password rather than using your personal meeting ID. You can also utilize waiting rooms where the host can admit participants, and lock Zoom meetings to prevent anyone else from joining them. Hosts also have the ability to control participants’ functionality such as removing their audio, video, and chat abilities, or booting them out of the meeting altogether. Learn more in our Zoom security blog post.

LastPass

Last Pass logo

LastPass is a password management tool that is available to all Bobcats. This tool auto-fills your login information when you sign in, and can be used across devices. It offers end-to-end encryption at the highest levels available, meaning only you have access to your information and your passwords are secure. Faculty and staff also have access to LastPass Enterprise with an added layer of security by DUO two-factor authentication enabled. Learn more about LastPass and sign-up for an account.

Phishing Scams

image of someone with a fishing rode trying to steal data from a computer

Be aware of phishing scams and those looking to obtain your sensitive information such as passwords or usernames. Sometimes phishing scam email can look real, as phishers try to make their email come from reputable companies. Most recently, stimulus package phishing scams are on the rise with text messages, calls, and emails from people impersonating government agencies including the IRS, CDC, FEMA, and WHO. So, it’s important to not click any links or provide any login information for these types of phishing attempts. If you do come across any suspicious email, be sure to forward as an attachment to Texas State’s Information Security Office.

Computer and Software updates

Animation of computer being updated

It’s also important to keep your computer up-to-date not only for computer performance, but also for the security of our files and applications. If you don’t update your computer, you could be susceptible to unpatched security flaws that could put your computer data at risk. In addition to keeping your software updated, we also recommend using anti-virus software. View our page on Windows and Mac anti-virus software.

The Information Security Office has many great guides on how to stay safe online. Be sure to also visit their Coronavirus Phishing page.

Cedrik Chavez is marketing and communications specialist student employee in the IT Marketing and Communications office.

Print Friendly, PDF & Email