Penn Computing

Penn Computing

Computing Menu Computing A-Z
Computing Home Information Systems & Computing Penn


Thursday, February 22, 2018

  New Resources
Security Logging Service
Travel Tips for Data Security
Free Security/Privacy Training Resources
Two-step verification
Combating Malware
Phishing Archive
Cloud Computing and Data Outsourcing
Best Practices for Applications with Confidential University Data
  Security "Greatest Hits"
Managing Passwords
E-mail Harassment & Forgery
Hoaxes, frauds & scams
Wireless Networking
  Best Practices
Secure desktop computing
Secure servers
Secure data deletion
Securing printers
Tips for safe computing
Computing policies
  More in-depth information for
Local support providers
System administrators
  Security initiatives
Critical Component compliance
Authentication & authorization
Penn Security & Privacy Assessment (SPIA)
Security Liaisons (Restricted Access)
Secure Share
Secure Space
Vulnerability Scanner
  Related links
Electronic privacy
Worms, trojans, backdoors

One Step Ahead: Almanac Security Tips - 2018

In each issue, Penn's Journal of Record, The Almanac publishes helpful tips and hints for dealing with information security and privacy matters. This page is a collection of all those published thus far.
New! You can now receive new One-Step-Ahead Security and Privacy Tips automatically!
You can subscribe via Email or RSS.

Table of Contents (view all)

Most recently published...

Security and Privacy Tips for the Summer Break
Protect your Home Computers by Turning On Automatic Updates
Personal vs University Accounts
Reuniting with your Missing Mobile Device
LastPass Premium:  Penn-Provided Software to Help Manage Your Passwords Securely
Filing Taxes Online This Year? Take Steps to Protect Your Information!
February is Data Privacy Month
Mobile Devices and Public Wi-Fi - Stick to Window Shopping
TMI: The Risks of Sharing Too Much Information on Social Media
Make Sure Your Email Gets Into Their Inbox
Avoiding Phishing Attacks
Be Wary of Fake Tech Support Telephone Call Scams!
Tips for Handling Electronic Access in Employee Termination
National Cyber Security Awareness Month - Free Secure Disposal of Paper
Begin the "Year of Discovery" By Knowing the Rules for Protecting Student Record Informati

Whats popular?

   privacy    security    identity theft    passwords    software    www    email    home computing    phishing    virus    hackers    documents        SSNs    mobile devices    keyloggers    wireless    social networking

Tuesday, May 24, 2016 - Almanac Vol. 62, No. 35

One Step Ahead: Security and Privacy Tips for the Summer Break

During the summer break, some faculty and staff work off-campus more often than during the academic year. While you are away from campus—whether at home or on the road—keep in mind that the Penn data you work with is only as secure as the machine and the network you use.

While traveling, don’t use unsecured wireless hot spots at hotels, airports, coffee shops or other public areas. On these networks, malicious users can potentially access your email and web data as it is delivered to your computer (depending on your applications settings).

Make sure you only use a computer that has the firewall setting turned on and antivirus software installed, and is up-to-date with software security patches. If you don’t keep your computer’s software up-to-date, you run a high risk of having your computer compromised.

Protect University data by working on a dedicated computer that no one else uses, or take advantage of Penn+Box (, a cloud solution that lets you store and edit files securely over the Internet. If that is not possible, use Remote Desktop to reach your campus computer, or create a separate user account and data storage area on your device’s hard drive that will be reserved for your Penn work.

Be especially careful about what data you store on portable devices, like laptops, USB drives and smartphones, which are easily lost or stolen. While requiring a passcode to unlock these devices is an important first step, extra protections like encryption or remote file deletion may also be necessary.

Last, but certainly not least, consider enrolling in Two-Step Verification for PennKey. This service protects your PennKey by requiring both a password and a code generated on your mobile phone. It is easy to set up, has little impact on your day-to-day experience and is a powerful antidote to stolen passwords.

For assistance or additional best practices when traveling, talk to your Local Support Provider.

For information on Penn+Box and to sign up, see:

For help in setting up two-step verification, see:

Information Systems and Computing
University of Pennsylvania
Comments & Questions

Penn Computing University of Pennsylvania
Information Systems and Computing, University of Pennsylvania