In today's digital world, secure computing isn't just an option, it's a necessary job for everyone. From our personal finances to national security, everything relies on computers and networks, making them prime targets for malicious attacks. Here's a quick overview of how to ensure the security of your data.
5 tips for Secure computing
Avoid interacting with phishing and suspicious emails
Be cautious when receiving unexpected emails or messages. Don't click suspicious links or download attachments from unknown sources
Lock your computer! Use The Windows Key + L
Never leave devices logged in or unattended. Manually locking your screen helps prevent others from viewing or using your data when you're not around.
Backup data to cloud storage
Using Cloud storage enables you to keep and recover data no matter what happens to your hardware or physical device - OneDrive, Dropbox, etc
Update your devices
Regularly update laptops and personal devices.
Updates patch security flaws, installs new features, and improves performance
Ensure your devices are safeguarded by using antivirus software.
If you’re on campus, you can utilize Windows Defender for this purpose (See below). This is built into Windows OS and you can run it from settings if you are ever concerned you may have a virus. This helps in identifying and warding off malware.
How to Start a Windows Defender Scan
From the Windows start menu open Settings
On the left side pane select Privacy & Security, this will be located near the bottom
Then select Windows Security on the right-hand side
Select Open Windows Security
A new window will open, select Virus & threat protection on the left-hand side
On the right-hand side select Scan options
Then select Full scan then scan now, it is highly recommended always doing a full scan or Microsoft Defender Antivirus versus the other scan options.
The simplest way to detect a phishing email is to review the full email address of the sender. Here is an example of a phishing email address:
______________________________________________________________
The email address you can see is not from Microsoft. The email is from @email-records.com instead of @Microsoft. It is important to review address because it will tell you where the email is sent from. You may also click on the email address, and it will expand to show more information.
Now for reporting an email for phishing follow these steps.
You may also follow the steps to block the email sender if you choose as well, but instead of report select block and then block the sender.
Mobile device security - https://it.ufl.edu/security/security-guidance/mobile-devices/mobile-device-security-faq/
USB drive standards https://security.ufl.edu/resources/usb-drives
Personal Device security https://security.ufl.edu/protect-yourself/protect-my/
UF IT policies -
2fa – duo https://it.ufl.edu/2fa/get-started/
Traveling abroad https://it.ufl.edu/security/audiences/faculty--staff/traveling-abroad/
Prohibited technologies https://security.ufl.edu/resources/prohibited-technologies/
Training https://it.ufl.edu/security/security-guidance/information-security-training/
![]() |