{"id":58,"date":"2020-04-02T08:14:10","date_gmt":"2020-04-02T08:14:10","guid":{"rendered":"https:\/\/www.jsums.edu\/cyberawareclone-demo\/?page_id=58"},"modified":"2025-10-07T15:28:20","modified_gmt":"2025-10-07T15:28:20","slug":"cyber-safety-tips","status":"publish","type":"page","link":"https:\/\/www.jsums.edu\/jsu-cyber-security\/cyber-safety-tips\/","title":{"rendered":"Cyber Safety Tips"},"content":{"rendered":"<p style=\"text-align: center;\"><strong><span style=\"color: #008080;\">Cyber Safety Tips:<\/span> <\/strong>Best Practices While\u00a0Working From Office Or Remotely<strong>\u00a0<\/strong><\/p>\n<p><span style=\"color: #008080;\">CYBER SAFETY BEST PRACTICES @ HOME &amp; WORKPLACE<\/span><\/p>\n<p><span style=\"color: #008080;\">TIP 1.<\/span>\u00a0<em><strong><span style=\"color: #000000;\">Avoid doing\u00a0workplace tasks when connected to public WiFi<\/span><\/strong><\/em><\/p>\n<p>If you are an employee that has to gain access to sensitive data sets (ex SSNs, Bank Account Information) for students and other employees connecting using a public wifi signal to conduct workplace duties \u00a0<a href=\"https:\/\/us.norton.com\/internetsecurity-online-scams-coronavirus-phishing-scams.html\">phishing email<\/a>\u00a0with malicious software could allow cybercriminals to take control of your computer, log your keystrokes, or access sensitive business information and financial data.<\/p>\n<p><span style=\"color: #008080;\">TIP 2.<\/span> <em><strong>Avoid pop-ups, unknown emails, and links<\/strong><\/em><\/p>\n<p>Here\u2019s a rule to follow: Never enter personal or company information in response to an email, pop-up webpage, or any other form of communication you didn\u2019t initiate. Phishing can lead to identity theft. It\u2019s also the way most ransomware attacks occur.<\/p>\n<p><span style=\"color: #008080;\">TIP 3.<\/span> <em><strong>Use strong password protection and authentication<\/strong><\/em><\/p>\n<p>Strong, complex <a href=\"https:\/\/us.norton.com\/internetsecurity-how-to-how-to-secure-your-passwords.html\">passwords<\/a> can help stop cyberthieves from accessing company information. A strong password contains at least<strong> 15 characters<\/strong> and includes numbers, symbols, and capital and lowercase letters. Companies also should ask you to change your passwords on a regular basis. Changing and remembering all of your passwords may be challenging. A password manager can help.<\/p>\n<p><span style=\"color: #008080;\">TIP 4.<\/span> <em><strong>Embrace cyber awareness education and training<\/strong><\/em><\/p>\n<p>Your responsibility includes knowing your company\u2019s cybersecurity policies and what\u2019s expected of you. That includes following them. If you\u2019re unsure about a policy, ask the Cyber Security personnel.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Safety Tips: Best Practices While\u00a0Working From Office Or Remotely\u00a0 CYBER SAFETY BEST PRACTICES @ HOME &amp; WORKPLACE TIP 1.\u00a0Avoid doing\u00a0workplace tasks when connected to public WiFi If you are an employee that has to gain access to sensitive data sets (ex SSNs, Bank Account Information) for students and other employees connecting using a public [&hellip;]<\/p>\n","protected":false},"author":131,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/pages\/58"}],"collection":[{"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/users\/131"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/comments?post=58"}],"version-history":[{"count":6,"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/pages\/58\/revisions"}],"predecessor-version":[{"id":1505,"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/pages\/58\/revisions\/1505"}],"wp:attachment":[{"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/media?parent=58"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}