Skip to Main Content

Library Technology Services: Secure Computing

Resources from Library Technology Services, for library employees

Secure Computing Tips

In today's digital world, secure computing isn't just an option, it's a necessary job for everyone. From our personal finances to national security, everything relies on computers and networks, making them prime targets for malicious attacks. Here's a quick overview of how to ensure the security of your data.


5 tips for Secure computing

  • Avoid interacting with phishing and suspicious emails
    Be cautious when receiving unexpected emails or messages. Don't click suspicious links or download attachments from unknown sources

  • Lock your computer! Use The Windows Key + L
    Never leave devices logged in or unattended. Manually locking your screen  helps prevent others from viewing or using your data when you're not around.

  • Backup data to cloud storage
    Using Cloud storage enables you to keep and recover data no matter what happens to your hardware or physical device  - OneDrive, Dropbox, etc

  • Update your devices
    Regularly update laptops and personal devices. 
    Updates patch security flaws, installs new features, and improves performance

  • Ensure your devices are safeguarded by using antivirus software. 
    If you’re on campus, you can utilize Windows Defender for this purpose (See below). This is built into Windows OS and you can run it from settings if you are ever concerned you may have a virus. This helps in identifying and warding off malware.

 

Windows Defender Scan

How to Start a Windows Defender Scan 

From the Windows start menu open Settings 

On the left side pane select Privacy & Security, this will be located near the bottom 

Then select Windows Security on the right-hand side 

Select Open Windows Security 

A new window will open, select Virus & threat protection on the left-hand side 

On the right-hand side select Scan options  

Then select Full scan then scan now, it is highly recommended always doing a full scan or Microsoft Defender Antivirus versus the other scan options. 
 

 

Report Phishing Emails

The simplest way to detect a phishing email is to review the full email address of the sender. Here is an example of a phishing email address:

______________________________________________________________
The email address you can see is not from Microsoft. The email is from @email-records.com instead of @Microsoft. It is important to review address because it will tell you where the email is sent from. You may also click on the email address, and it will expand to show more information.

Now for reporting an email for phishing follow these steps.

  1. Select the three dots to the right of the ribbon
  2. Select Report
  3. Select Phishing

You may also follow the steps to block the email sender if you choose as well, but instead of report select block and then block the sender.

 

University of Florida Home Page

This page uses Google Analytics - (Google Privacy Policy)

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.