Staying cybersafe doesn't have to be hard. Just by following the simple guidelines on this page, you can secure your devices, your data and our network. By implementing these easy practices into your daily life, you are building life skills that will serve you long after you have left the University. However, don't keep this valuable informatin to yourself. Share it with your family and friends. Together we can make our online world a safer place to work and play.
To secure your online world:
- Lock the screen of all mobile devices when they are not being used.
- Password protect USB keys/flash drives and portable drives.
- Treat your mobile device as if it were cash. Do not leave it unsecured when it is unattended. Do not leave it in your car.
- Password should be 12 characters or greater.
- Don't share them with anyone for any reason.
- Use a password manager to store and generate unique passwords for every account.
- Enable two factor authentication when it is available.
- Do not use your Mount Royal username or password for none work websites.
- Lock your screen anytime you leave your workstation unattended
Do not click on any links or open any attachments in emails that you are not expecting regardless of who they are coming from. If you need to access information from a link or attachment:
- Phone the sender directly using a number you know is legitimate to verify the legitimacy of the the email
- Navigate to the website directly using an URL that you know is legitimate.
Sensitive data is private information about companies, organizations, projects or people. It includes personal and financial data as well as intellectual property and proprietary business information. It is found everywhere from printed documents, physical files, portable storage media (CDs/DVDs/USB), laptops/computers, mobile devices, printers, online accounts and cloud services (ie Google drive), It is important that this information is properly shared, stored and protected throughout its lifecycle as well as properly destroyed so it is unreadable when it is no longer needed.
- Limit access to sensitive information to those who have a business need.
- Reguflarly audit your data, destroying it when it is no longer needed.
- Keep sensitive data inside applications like FAST and Banner.
- Limit the number of copies made of sensitive data to reduce the exposure risk.
- When sending emails, double check the recipient email address and use the BCC field to keep recipients' personal email addresses private.
- Encrypt all portable devices that store data
- Sanitize old devices before disposing of them. Contact the IT Service Desk to find out how.
For more details on securing sensitive data, visit the Data Privacy Best Practices web page.
Looking for more information?
Check out these resources for additional information on cyber safety.
- MRU Cybersecurity Community chat - get instant answers to your cybersecurity questions along with real time alerts
- Cybersecurity Blog - short but informative articles on a variety of cybersecurity topics. Search to find what interests you.
- Cyber Spollight - a weekly newsletter with brief summary's of the latest cybersecurity threats and how to protect yourself.
- PhishBowl - a listing of all the phishing emails that have arrived in campuse inboxes. This list is updated as new emails are reported.
- Cybersafety Survival Guide - a one page pamphlet with the bare basics you need to stay cybersafe.
- Quick Reference Guides - a collection of short helpful guides on various aspects of cybersafety including troubleshooting documents.