Information Security Corner

Resolve to Review Your Security Profile

Resolve to Review Your Security Profile

Threat actors and hackers are continually looking for victim’s weaknesses in their security profile as potential ways to exploit them for malicious activity.  Performing periodic reviews (at least annually) of your security practices within your home or office environment and with your personal or business information technology (your security profile) will enable you to identify weaknesses and areas for improvement before threat actor discover and misuse them.

When performing a security review, consider at least the following practices.

Physical Security:

  • Check the locks on doors, drawers and cabinets where important items (data and technology) are located or stored.
  • Store important data, documents and technology securely.
  • Turn monitors away from high traffic throughway and use secure screensavers to prevent casual viewing.

Technology Security:

  • Secure mobile devices when not in use.
  • Keep computer software (operating systems and critical use software) up-to-date and patched.  Don’t forget to update Internet router and Wi-Fi access point software and passwords.
  • Ensure anti-malware software is installed, updated and current, and in-use on all devices.

Access Security:

  • Change passwords on all critical (banking, consumer, personal email, etc.) Internet sites.
  • Keep browser software clean (limit add-ons and extensions) and set security settings appropriately (as securely as practical).
  • Use a virtual private network (VPN) connection for all Internet communications and transactions.

Beat the bad-guys by reviewing and improving your security profile early (and often) this year to protect UTMB’s and your important data, information and resources.

 

Thank you for being security aware!