Safe Computing
The Department of Information Technology and our IT Security team work to ensure the security of Seton Hall systems and data, but we want to help you keep your information and devices secure even when you're not at school or work. Cybercrime is continually on the rise, but you can take steps to protect yourself. Take an active role in securing your information by learning more about strong passwords, managing mobile devices, avoiding threats, developing safe habits and using the right tools.
However you use technology in your daily life -- whether you are a minimalist or a techie -- our site will give you the information you need to keep your devices and information secure.
Prevent Malware
- Never click on a link contained in a suspicious email.
- Use your computer's virus protection software to scan any removable media you insert into your computer.
- Never uninstall or disable your computer's virus protection software.
- Alert the Service Desk about virus and malware threats you have received.
Protect your Identity
- Do not leave wallets, purses or other items that may contain personal information where others have access to them.
- Do not connect to any unsecure wireless networks from your smart phone, tablet or handheld devices.
- Be aware of your surroundings when using ATM machines or retail kiosks.
- Create safe and secure passwords.
Do Not Feed the Phish
- Be suspicious of unsolicited phone calls, visits or email messages from individuals who ask about employees or other internal information.
- Never click on a link in a suspicious email. Phishing sites typically ask for your credit card or other confidential information.
- Never respond to requests for personal information via email.
- Check to make sure that websites that require confidential information use encryption.
Reduce Spam
- Check the privacy policy before you submit your email address to a website.
- Office 365 automatically quarantines messages that may be spam or phishing.
- Delete text messages that ask you to confirm or provide personal information: Legitimate companies don’t ask for information like your account numbers or passwords by email or text.
- Clicking on a link in the message can install malware that collects information from your computer or phone.
Stand up to Cyberbullying
- Save all evidence of cyberbullying.
- Block the bully on your phone, email and text messaging services.
- Get a new email account and/or mobile telephone number if necessary.
- Don't reply to bullying messages.
- Treat others the way you'd like to be treated.
- Don't be ashamed to alert the proper authorities about being bullied.