Computing securely and safely is an important issue to maintaining Samuel Merritt’s networks of information. Do not respond to any e-mail that asks for personal information. They are phishing scams designed to trick you into revealing sensitive personal information (e.g. passwords, credit card numbers, SIN) that is then used for fraud or identity theft. Phishing typically takes the form of an e-mail message that appears to come from a trusted organization (e.g. your bank, the University), but is actually from the identity thieves.
As a member of the Samuel Merritt community, you must responsibly use Samuel Merritt’s computing resources to protect your information and Samuel Merritt’s data. You must clean and secure your computer from malicious threats so that you don't expose the Samuel Merritt’s network to outside hackers and phishing scams. You must keep data safe and secure, especially when storing data on portable devices (USB sticks, thumb drives ,etc.). Also, you need to be sure data is destroyed on equipment that is being eliminated. The Information Technology department offers advice and guidance in all these areas. Contact the Help Desk for advice or specific questions.
Top 10 to be Aware of….
- Do NOT use passwords that other people can guess like ‘Password’ or the name of your pet.
- Never give out personal information about yourself, your family, or your friends including social security numbers, bank PIN number, last names, birthdays, or passwords.
- Do NOT download pirated songs, movies, or games you haven’t paid for, because it’s against the law.
- Keep your Web browser and operating system software up to date with the latest security patches.
- Use antivirus software to protect your computer from viruses, spyware, and other malware.
- Use the security features of social network sites to protect your privacy.
- Only accept friend requests on social network sites from people you actually know.
- Don’t click on Internet pop-up ads because they might install spyware on your computer.
- Don’t open e-mail attachments or instant-message attachments from unexpected sources.
- Be skeptical! Not everything on the Internet is true.
Tools such as Trend Micro Office Scan help protect the Samuel Merritt’s computing environment by locking out potential hackers. To further protect your computer, DO NOT open unsolicited attachments for any reason. The minute you click on the attachment, the infection process begins. Your refusal to open unsolicited email attachments is an important part of the initiatives IT relies upon to help you protect your computer and Samuel Merritt’s IT resources. (Also, be wary of email requesting you to reply back or follow a link to enter private information such as passwords.)