- Use disposable email addresses (yahoo, hotmail, etc.) when registering for online services or websites. You will cut down on spam to your standard email address.
- Do not respond to “opt-out” statements in email addresses unless you are comfortable that the sender is a reputable company.
- Be sure that any mailing lists you subscribe to do not release the names of their members.
- Avoid publishing your standard email address on blogs and other websites.
- If you do not recognize the sender of the message and/or the subject line is senseless or offensive, delete the email.
- Do not open attachments unless you are expecting them. Even if you know the sender, you should be very careful opening attachments. Although an email may look like it is from someone you know it is possible a spammer is spoofing their email address.
- Strong unique passwords are important as the first line of defense between you and a hacker.
- Do not use the same password on multiple sites
- Strong passwords can help you protect your computer and your identity.
- Create passwords that are both easy for you to remember and also hard for someone else to discover.
- Use a password manager to help you maintain strong passwords. Learn more about password managers
Strong Passwords are:
- at least 8 characters – the longer the better
- contain uppercase & lowercase letters
- contain non-alpha characters ($, %, &, !)
- contain numbers
Strong Passwords are NOT:
- variations of your name or login
- dictionary words
- names of your pets or family
- easily discovered numbers such as license number, telephone number, your favorite TV show, etc…
- all numbers or all lowercase letters
- 500 Worst Passwords
It is easy to create passwords that are both easy to remember and hard to break.
Gc4$/glS is an example of a good, strong password. It has a combination of uppercase and lowercase letters, it contains a number and non-alpha characters. It also is relatively easy to remember.
Additionally, you should setup your computer to lock itself after a short period of inactivity to keep unauthorized users from accessing your machine.Contact the Help Desk