Securing Your Devices

Tips to secure your devices

MSSND: How to Secure Devices

Device Security

If you have a personally-managed Windows, Mac, IOS or Android device that needs to comply with MSSND requirements, follow the step-by-step instructions below for how to configure your device to meet campus policy.

MSSND #1: Patching and Updates...

Securing IoT Devices

While many have come to rely on Internet of Things (IoT) devices for added efficiency and convenience, the devices are also entry points cybercriminals can use to violate your security and privacy. According to Symantec’s 2019 Internet Security Threat Report (ISTR 24), “IoT devices experience an average of 5,200 attacks per month. Routers and connected cameras were the main source of IoT attacks accounting for over 90 percent of activity.” Various IoT devices have been exploited: baby monitors; security...

Securing Home Wi-Fi

Routers are one of the most important electronic devices that you have in your home. They link your other devices together and to the outside world, and that's why they are such a valuable target for attackers.

A secure Wi-Fi system helps keep unauthorized people off your network and reduces the risk of data loss, theft, and/or sabotage. That’s why we put together these key steps to securing your Home Wi-Fi.

Secure Your Router

To create a secure home network, start by securing your router - that’s the...

Enabling Full Disk Encryption

Overview

Full disk encryption should be implemented for all portable devices when:

Storing or processing Institutional Information classified at P3 or higher

External requirements mandate the use of full disk encryption (such as research Data Use Agreements with third-party data providers)

Full disk encryption protects the data on your...

Browser Extensions: How to Vet and Install Safely

What is an extension?

A browser extension is essentially a small piece of software that performs a function or adds a feature to a browser client. Since extensions are given special authorizations within the browser, they are attractive targets for attackers.

How to use extensions (more) safely

Even though extensions can be risky, if used correctly, they can be extremely beneficial. It’s especially important to research extensions if you are using an application that accesses...

Cleaning an Infected Computer of Malware

If the system has any data classified as Protection Level 4 (P4)
disconnect it from the network - don't turn it off or unplug it - and
immediately contact at (510) 664-9000 (option 4)

Attackers often leave “backdoors” on a compromised computer and removing them all can be difficult, if not impossible. We recommend ...

Network Printer Security Best Practices

Multifunction printers (MFPs) are experiencing an identity crisis: IT administrators don't always see them as the full-fledged networked computers they really are. But attackers do - and they are finding them increasingly very attractive!

These printers, shoved in the corner of the office and quietly going about their business of copying, printing, faxing and scanning, might not seem to pose any real security risk. But like any networked device, if not properly managed, they can expose sensitive campus data to unauthorized access and misuse.

To secure your printers from...

Reinstalling Your Compromised Computer

Overview

The following is a general guide on how to perform a clean reinstall of your computer. Reinstalling a computer after it has been compromised can be a painstaking process, but it is the best way to be certain that everything an attacker left behind has been found.

Checklist before performing a reinstall Change passwords - You should change passwords to all systems you have connected to from your computer during the period it could have been compromised. Especially look at bank and credit...