Full Listing

A Best Practices Guide for Computer Security
View The Full Article
Security is a part of our every day thinking in this day and age. Clemson University takes security seriously and wants our users to be vigilant and practice due diligence when it comes to security. It is important that our users understand what is expected of them in securing Clemsonand39s resources as well as what concerns they should have to avoid falling victim to a security incident. This guide serves as a best practices guide to aid the user in following good security practices to help keep Clemson a safe and secure environment. Adhere to Clemson Computing Policies By agreeing to be a part of Clemson, you are also agreeing to abide by the policies established at Clemson. These policies are not intended to restrict or limit your effectiveness as a Clemson user but rather to help guarantee a safe environment for all users. It is important that users are aware of these policies and guidelines so that they can put them into practice as well as being alert for abuse of those policies. Please refer to CCITand39s Policies and Procedures site for more information. Protect your Identity It is vital that you safeguard your personal information as well as your Clemson account while working here at Clemson. Here are some helpful tips to assist you in protecting your identity at Clemson: Keep all electronic/physical items containing personal/account information secure at all times. Email is NOT a means of secure communication....never email personal information such as SSNand39s or passwords Never store personal information or SSNand39s on removable media such as USB keys, portable hard drives, etc. .. Use strong passwords and take appropriate measures to safeguard them as outlined in the UserID and Passwords Policy. Never give out your password to another user or an IT administrator. Be careful of emails that ask for you to go to a web page and enter login information...type the web address manually rather than clicking on a link within the email. Safeguard your workstation While most Clemson faculty and staff machines are secured using our Campus Domain, itand39s a good idea to keep your machine clean and updated as well as protected by performing the recommended steps below: Turn on Windows Automatic Updating Visit Windows Update and check for updates Verify Trend Micro is installed/updated Run AntiSpyware scans and check for spyware Lock your workstation CtrlAltDel Enter before leaving it idle Do not allow other users to work on your machine under your signon Be careful of downloading free programs as they tend to bring spyware along Do NOT install any file sharing programs such as Kazaa, Bearshare, etc. .. Be Alert Clemsonand39s IT staff can only provide a layer of protection but it is up to the users to be vigilant and alert of threats to Clemson users and resources. Here are some things to look out for as you work each day at Clemson: NEVER give out your password to someone requesting it. Clemson IT staff will never ask for your password...please report anyone attempting to do so. Be alarmed if someone posing as a support person wants to work on your machine if they do not have an ID...feel free to card them Report any suspicious users or actions that you feel could be malicious behavior. Report any suspicious behavior on your machine to your support person such as wandering mouse activity, deceiving popups, or spontaneous programs. Report any harassment witnessed whether physical or electronic. Report any attempts to circumvent our security protections for personal gain or malicious intent.