Skip to main content

Secure Your Computer and Mobile Device Articles

back
Show titles with any search term.
  • Keep Others from Accessing Your Computer or Device

    • In Microsoft Windows 7, each person who uses the computer should have a separate account. Accounts can have either Standard privileges or Administrator privileges.  The computer...
    • In Microsoft Windows Vista, each person who uses the computer should have a separate account. Accounts can have either Standard privileges or Administrator privileges.  The computer...
    • Unless your computer is in a secure space that is accessible ONLY BY YOU, you must run a screen saver that will automatically lock your screen after 15 minutes of inactivity and require a password...
    • Best practices for everyone (students, faculty, and staff): Although these are requirements for employees handling sensitive information, it is also good practice to configure all devices in...
    • When you leave your computer, it’s best to start a screen saver that can only be turned off with a password. You should set up a screen saver that will start after your computer has been idle for...
    • When you leave your computer, it’s best to start a screen saver that can only be turned off with a password. You should set up a screen saver that will start after your computer has been idle for...
    • Strong passwords are the barrier between your information and resources and criminals who are trying to get at them. Whether it's a password for your computer, to use your NetID to access online...

    Keep Your Security Protection Up To Date

    • Cornell policy requires your department to escrow passwords (securely store a copy) for all encrypted data. Why password escrow is necessary: If you encrypt university...
    • Always run antivirus software configured for daily updates and active monitoring.   Antivirus software helps keep your computer free of malicious software (viruses, worms, trojan...
    • Sometimes, security issues aren’t recognized right away, because it’s difficult to tell the difference between your computer’s everyday quirks and things caused by a security problem. Here are a...
    • Keeping Your Devices Safe Never leave anything unattended in a public area, in a shared living space, or visible for potential intruders. Use physical locking devices or take it...
    • Without up-to-date software, the average unprotected computer connected to the Internet can be compromised in less than a minute. The single most important step to securing your computer is to...

    Stay Safe on the Internet

    • Note: Java is required for some individuals at the university to use Kronos. The Kronos Full (Java) version is mandatory for pay reps and some supervisors. Some departments may choose to have...
    • Disable popups in your browser. Popup windows can be used to run malicious software. Internet Explorer Click Tools, and then choose Internet Options. Click...

    Work With Others Securely

    • You may need to share files with other people. Use the following approved options: Departmental file servers: Exchange files with other people in your department. Ask your department’s...