Safeguarding your device
Every computer that connects to the ÃÈÃÃÉçÇø network is a vulnerability, providing a potential entry point for cyber criminals. Therefore, every device our community uses to connect to any ÃÈÃÃÉçÇø system or resource carries the risk of becoming the chosen route for hacking into ÃÈÃÃÉçÇø and UofT. These devices can be exploited by malware that could leak or steal sensitive data. What can we collectively do?
Keep technology current
Current technology is equipped with necessary protections to respond to current threats. If you are using an ÃÈÃÃÉçÇø CRP device, you are all set! All CRP devices are managed with security in mind and all institutional software is always kept up to date.
Replace end of life systems
Systems that have reached end-of-life (EOL) pose a security risk. EOL means that the manufacturer/vendor stops marketing, selling, and providing support and updates to the system. When you use devices that are not updated to the latest firmware, you can open yourself up to cyber attacks.
Firmware is the software that is installed and updated by the manufacturer and contains important security measures.
Still on Windows 10? Time to move to Windows 11
Windows 10 is becoming end of life. Contact Education Commons to coordinate the move to Windows 11 on your computer.
Adopt the principle of least privilege
Least privilege is key to good cybersecurity. It means that one should have the least amount of access (privilege) to data, systems, and assets that are needed to get their work done.
The principle of least privilege safeguards critical data and systems by shrinking the attack surface, limiting the scope of attacks and reducing the impact of human error.
Over-privileged users, whether human or machine, increase the potential for breaches within an organization and the extent of damage to critical systems should a breach occur. Without adequate protections, common privileged threat vectors, including hackers, malware may misuse, exploit, or actively harm highly-sensitive systems.
Safe Browsing
Scammers use websites to steal your credentials, trick you into downloading malicious software, and present you with false information that looks legitimate. Review Do’s and Don’t for safe browsing
Avoid public WiFi
One of the biggest risks associated with using public WiFi is that it can be unsecured and vulnerable to attack. Hackers can use this vulnerability to steal your personal information or install malicious software on your devices without you knowing.
Using strong passwords may provide some protection when using public WiFi.