Securing Your Devices

Tips to secure your devices

MSSND: How to Secure Devices

Device Security

If you have a personally-managed Windows, Mac, IOS or Android device that needs to comply with MSSND requirements, follow the step-by-step instructions below for how to configure your device to meet campus policy.

Enabling Full Disk Encryption

Overview

Full disk encryption should be implemented for all portable devices when:

  • Storing or processing Institutional Information classified at P3 or higher

  • External requirements mandate the use of full disk encryption (such as research Data Use Agreements with third-party data providers)

Browser Extensions: How to Vet and Install Safely

What is an extension?

A browser extension is essentially a small piece of software that performs a function or adds a feature to a browser client. Since extensions are given special authorizations within the browser, they are attractive targets for attackers. 

Cleaning an Infected Computer of Malware

If the system has any data classified as Protection Level 4 (P4)
disconnect it from the network - don't turn it off or unplug it - and
immediately contact at (510) 664-9000 (option 4) 


Network Printer Security Best Practices

Multifunction printers (MFPs) are experiencing an identity crisis:  IT administrators don't always see them as the full-fledged networked computers they really are.  But attackers do - and they are finding them increasingly very attractive!

Reinstalling Your Compromised Computer

Overview

The following is a general guide on how to perform a clean reinstall of your computer. Reinstalling a computer after it has been compromised can be a painstaking process, but it is the best way to be certain that everything an attacker left behind has been found.