IT Helpcdesk

Top 10 List of Secure Computing Tips

 You are a target to hackers

Don’t ever say, “It won’t happen to me.” We are all at risk and the stakes are high – both for your personal and financial well-being and for the university’s standing and reputation. 

  • Cybersecurity is everyone’s responsibility.
  • By following the security tips and remaining vigilant, you are doing your part to protect yourself and others.

Keep software up-to-date

Installing software updates for your operating system and programs is critical. Always install the latest security updates for your devices:

  • Turn on Automatic Updates for your operating system. (Consult IT Office)
  • Use web browsers such as Chrome or Firefox that receive frequent, automatic security updates.
  • Make sure to keep browser plug-ins (Consult IT Office)

Avoid Phishing scams – beware of suspicious emails and phone calls

Phishing scams are a constant threat – using various social engineering(link is external) ploys, cyber-criminals will attempt to trick you into divulging personal information such as your login ID and password, banking or credit card information.

  • Phishing scams can be carried out by phone, text, or through social networking sites – but most commonly by email.
  • Be suspicious of any official-looking email message or phone call that asks for personal or financial information.

Practice good password management

We all have too many passwords to manage, always change password at least after 90 days.

Be careful what you click

Avoid visiting unknown websites or downloading software from untrusted sources. These sites often host malware that will automatically install (often silently) and compromise your computer.

If attachments or links in the email are unexpected or suspicious for any reason, don’t click on it.

Never leave devices unattended

The physical security of your devices is just as important as their technical security. 

  • If you need to leave your laptop, phone, or tablet for any length of time – lock it up so no one else can use it. 
  • If you keep protected data on a flash drive or external hard drive, make sure their encrypted and locked up as well. 
  • For desktop computers, lock your screen or shut-down the system when not in use.

Safeguard Protected Data

Be aware of Protected Data that you come into contact with and its associated restrictions.

  • Securely remove sensitive data files from your system when they are no longer needed.
  • Always use encryption when storing or transmitting sensitive data.

Use mobile devices safely

Considering how much we rely on our mobile devices and how susceptible they are to attack, you’ll want to make sure you are protected:

  • Lock your device with a PIN or password – and never leave it unprotected in public.
  • Only install apps from trusted sources (Apple AppStore, Google Play).
  • Keep the device’s operating system up-to-date.
  • Don’t click on links or attachments from unsolicited emails or texts.
  • Avoid transmitting or storing personal information on the device.
  • Most handheld devices are capable of employing data encryption.

Install antivirus/anti-malware protection

Only install these programs from a known and trusted source. (Consult IT Office)

Back up your data

Back up regularly – if you are a victim of a security incident, the only guaranteed way to repair your computer is to erase and re-install the system. (Consult IT Office)


Accessing Your Email

You are able to access your WIU email through a variety of ways

  • Webmail
  • Mobile device
  • Microsoft Outlook 365
  • Mac Mail

Create a Signature in Outlook 2016

  1. First, launch Outlook 2016 then select File > Options.
  2. Next select the Mail tab and then Signatures.
  3. Select New and type in a name for the signature you’re creating.
  4. Enter the information you would like to include with your email signature.
  5. Then Save.