Posted April 26, 2018 by Academic and Institutional Technology
You’re the Key to Keeping Data Secure
As of October 1, 2017, Wheaton College officially adopted a reviewed and refined version of our Technology Acceptable Use Policy. The purpose of the Technology Acceptable Use Policy is to clearly establish Wheaton College’s position relating to the acceptable use of its technology and your responsibility to protect our information resources. We’d like to highlight an important aspect of the policy that may need your attention.
In today’s unpredictable environment, filled with rapidly evolving cyber threats and advanced technologies, the best defense against cyberattacks at Wheaton College is you – our employees! You are constantly the target of cybercriminals, and it’s up to you to think twice about keeping data secure.
Wheaton College’s firewalls are able to prevent many of these attacks, but not all threats can be detected by automated tools alone. Security is up to each and every one of us, and we all have a responsibility to protect ourselves against cyberthreats. One of the most common threats to Wheaton College are phishing emails, which are scam emails that pose as legitimate people or organizations.
When you see a suspicious email, remember to do these three things:
- Stop and think
- Hover your mouse pointer over the link to check its legitimacy
- Forward the message to the AIT Service Desk
Additional security measures you can take to protect data are:
- Never sharing your NetID and password
- Completing the annual cybersecurity awareness training
- Using services provided by Wheaton College for all of your work-related needs
- Working securely when you are off-campus
- Enabling two-step login on all of your accounts
- Using the Outlook App to access your Wheaton College email from your mobile device.