Security is a part of our every day thinking in this day and age. Clemson University takes security seriously and wants our users to be vigilant and practice due diligence when it comes to security. It is important that our users understand what is expected of them in securing Clemson's resources as well as what concerns they should have to avoid falling victim to a security incident. This guide serves as a best practices guide to aid the user in following good security practices to help keep Clemson a safe and secure environment.
Adhere to Clemson Computing Policies
By agreeing to be a part of Clemson, you are also agreeing to abide by the policies established at Clemson. These policies are not intended to restrict or limit your effectiveness as a Clemson user but rather to help guarantee a safe environment for all users. It is important that users are aware of these policies and guidelines so that they can put them into practice as well as being alert for abuse of those policies.
Please refer to CCIT's Policies and Procedures site for more information.
Protect your Identity
It is vital that you safeguard your personal information as well as your Clemson account while working here at Clemson. Here are some helpful tips to assist you in protecting your identity at Clemson:
- Keep all electronic/physical items containing personal/account information secure at all times.
- Email is NOT a means of secure communication....never email personal information such as SSN's or passwords
- Never store personal information or SSN's on removable media such as USB keys, portable hard drives, etc. ...
- Use strong passwords and take appropriate measures to safeguard them as outlined in the User ID and Passwords Policy.
- Never give out your password to another user or an IT administrator.
- Be careful of emails that ask for you to go to a web page and enter login information...type the web address manually rather than clicking on a link within the email.
Safeguard your workstation
While most Clemson faculty and staff machines are secured using our Campus Domain and Trend-Micro Anti-Virus Server, it's a good idea to keep your machine clean and updated as well as protected by performing the recommended steps below:
- Turn on Windows Automatic Updating
- Visit Windows Update and check for updates
- Verify Trend-Micro Anti-Virus is installed/updated
- Run Anti-Spyware scans and check for spyware
- Lock your workstation (Ctrl-Alt-Del + Enter) before leaving it idle
- Do not allow other users to work on your machine under your sign-on
- Be careful of downloading "free" programs as they tend to bring spyware along
- Do NOT install any file sharing programs such as Kazaa, Bearshare, etc. ...
For help with some of these steps, refer to the Cleaning Up Your System Solution Guide.
Clemson's IT staff can only provide a layer of protection but it is up to the users to be vigilant and alert of threats to Clemson users and resources. Here are some things to look out for as you work each day at Clemson:
- NEVER give out your password to someone requesting it. Clemson IT staff will never ask for your password...please report anyone attempting to do so.
- Be alarmed if someone posing as a support person wants to "work" on your machine if they do not have an ID...feel free to card them!
- Report any suspicious users or actions that you feel could be malicious behavior.
- Report anyone sitting in a parked car with what looks like an antenna hanging out the window as they may be attempting to hack our wireless network.
- Report any suspicious behavior on your machine to your support person such as wondering mouse activity, deceiving pop-ups, or spontaneous programs.
- Report any harassment witnessed whether physical or electronic.
- Report any attempts to circumvent our security protections for personal gain or malicious intent.
To report a security incident, please fill out the Incident Report Form.