Penn Computing

Penn Computing

Computing Menu Computing A-Z
Computing Home Information Systems & Computing Penn

 

Tuesday, September 2, 2014

 
  New Resources
Travel Tips for Data Security
Free Security/Privacy Training Resources
Penn+Box
Two-step verification
Combating Malware
SafeDNS
Phishing Archive
Cloud Computing and Data Outsourcing
Best Practices for Applications with Confidential University Data
 
  Security "Greatest Hits"
Managing Passwords
E-mail Harassment & Forgery
Hoaxes, frauds & scams
Spam
Phishing
Wireless Networking
Encryption & digital signatures
 
  Best Practices
Secure desktop computing
Secure servers
Secure data deletion
Securing printers
Tips for safe computing
Computing policies
 
  More in-depth information for
Local support providers
System administrators
 
  Security initiatives
Critical host compliance
Authentication & authorization
Penn Security & Privacy Assessment (SPIA)
Security Liaisons (Restricted Access)
Secure Share
Secure Space
Vulnerability Scanner
 
  Related links
Electronic privacy
PennKey
Viruses
Worms, trojans, backdoors

Top 10 Information Security Tips for Penn Faculty

Developed by the Office of Information Security

  1. Know where to get help - Get to know your Local Support Provider (LSP). For more information see: www.upenn.edu/computing/view/support/faculty.html
  2. Practice "good hygiene"
    • Keep your operating system and applications up to date with patches (enable "auto-updating" whenever possible). Windows users should use Penn's free service: www.upenn.edu/computing/waus/.
    • Turn on your system's firewall.
    • Install anti-virus software and keep it and its virus definitions up to date. Penn makes this very easy to do by providing licenses for Symantec Anti-Virus (SAV) for your work and personal computers (PCs and Macs) at no cost. See Security Application section: www.upenn.edu/computing/product/.
  3. Use strong, unique passwords (for your computers, and for systems like PennKey and Facebook) and don't ever share them with anyone.
  4. Eliminate PII - Purge all sensitive data (SSNs, credit card information, student records, health information, etc.) from your computer unless it is absolutely necessary. Your LSP can help you automate the process of finding sensitive data using special software.
  5. Be wary of unsolicited links or attachments - Be suspicious of links or attachments delivered via email that you didn't ask for. Check with the sender before opening them or use other methods to ensure they are benign, like searching for the same content yourself independently online or scanning attachments with your anti-virus software.
  6. Be alert for "phishing" - Phishing refers to a specially crafted e-mail from an attacker that looks legitimate in an effort to trick you into divulging personal information. For more information on detecting and avoiding phishing attempts see: www.upenn.edu/computing/security/advisories/phishing.php
  7. Not all wireless connections are equal. AirPennNet provides secure authentication and encrypted traffic. AirPennNet-Guest provides secure authentication, but does not encrypt your traffic. Unencrypted traffic means that a malicious user could potentially sniff your email and web data as it is delivered to your computer (depending on your applications settings). Lastly, public wireless hot spots, such as those offered at web cafes and coffee shops, may have an even larger untrusted community and pose even more risks. Know your wireless networks and use encrypted services whenever in doubt (e.g., HTTPS over HTTP when web-browsing).
  8. Protect research data - The requirements for data manipulation, collaboration and publication impose unique risks on research data. Make sure to securely backup your data in case of corruption or loss, and to encrypt it when transmitting or shipping it if it contains PII. Maintain awareness of any federal requirements for data protection, storage and accessibility as well. When in doubt, your LSP can help.
  9. Beware the cloud - Cloud services provide new and exciting opportunities to communicate, collaborate, and compute. Unfortunately, they also introduce compliance and other risks. Familiarize yourself with the Cloud Guidance document and contact your LSP for questions and assistance: www.upenn.edu/almanac/volumes/v56/n27/cloud.html
  10. Protect Student Data - The University's Policy on the Confidentiality of Student Records - which incorporates the federal Family Educational Rights and Privacy Act (FERPA) law - provides the most directly relevant rules on the protection of student data: www.upenn.edu/almanac/volumes/v56/n25/confidentiality.html. If you need assistance contact your LSP or the University Privacy office at privacy@upenn.edu
For more information and resources please see the Information Security website at http://www.upenn.edu/computing/security, or contact us at security@isc.upenn.edu or 215-898-2172.

Last updated: Friday, August 12, 2011

top

Information Systems and Computing
University of Pennsylvania
Comments & Questions


Penn Computing University of Pennsylvania
Information Systems and Computing, University of Pennsylvania