Device Security - Baseline
The most common forms of computer attacks are executed via email, malicious websites, removable media, and social engineering. Although the computer itself is under attack, the primary target is the end user's data. The attacker is attempting to trick the user into performing the actions needed to execute the attack. To protect yourself and your workstation you will want to:
- Recognize malicious emails and refrain from clicking on attachments or links.
- Use your work computer for work purposes. Limit casula web browsing and never click on advertisements.
- Be careful with removable media. If you find a lost USB drive or other removable device, it might have malicious software on it. Do not connect it to your computer. Instead, turn it over to your local IT staff or the DoIT Help Desk.
- Beware of social engineering. Social engineering is the clever manipulation of human willingness to trust other people. The best-automated defenses cannot protect against this type of attack.
If you have questions or concerns, please contact your local IT staff or the DoIT Help Desk.
If you utilize a personal computer for any work purposes, you need to ensure the security of that device. There are several best practices that you can utilize to secure personal devices:
- Keep your operating system patched with the most recent updates. A few examples of these applications are your Internet browser, Adobe products and Java.
- Install and maintain anti-virus software. All staff can obtain free anti-virus software through the University for Windows and Mac systems.
- Ensure that a host-based firewall is enabled.
- If you are not connecting locally to the DoIT Staff Network, review the Campus Tools to Work Remotely. Primarily, understand how to use WiscVPN to secure your remote connection.
- Password protect your workstation. For guidance on creating password review the How to select, manage and protect passwords guide.
Securing Mobile Devices
The biggest security concern with mobile devices is that they are easy to lose or misplace. Additionally, mobile devices face most of the same threats as typical workstations, plus a few unique challenges:
Malware and Spyware: The amount of malware reported for mobile devices is rapidly increasing. There may be an anti-malware app for your phone.
App Permissions: The access that an application, particularly a “free” one, requests could include everything from your contact list to your physical location. This information may be stored or distributed to third parties by the app developer, as well as stolen or intercepted by unauthorized users.
Dialing for Dollars: An attacker sets up a premium text message system. The attacker creates malware to dial that number. The malware is installed as part of a downloadable game. The cell phone then periodically texts the number adding charges to the owner's cellular bill.
QR Codes and Shortened URLS: Short URL or QR Codes do not indicate where the end user is getting directed. They could be sent to a site that attacks the user's device.
Phishing Websites: Phishing websites are not new. Scammers have been targeting mobile devices because it is more difficult to recognize the site. Mobile devices make it difficult recognize the sites without security software.
Drive-by Downloads: This is a real website that an attacker has compromised and installed hidden malware. The malware will download when a user visits the site. This site is difficult to detect without security software.
BEST PRACTICES FOR MOBILE
- Be sure to use a strong and unique passcode or pattern sequence. If your unlocked phone is stolen your work accounts can be accessed easily.
- Keep your device up to date. That includes both the operating system and the apps running on your device.
- Look into tracking and remote wipe options for your phone
- Be cautious when clicking on links or QR Codes.
- Research an app before installing it.
Connecting Remotely and Public Access
While the Internet allows us to work from nearly anywhere, it also makes it easier for attackers to listen in on our communications. You should be especially mindful of how you're accessing campus resources from an untrusted network. Fortunately, there are tools and resources available to assist you and protect your devices.
- Connect via WiscVPN. If you are connecting through an untrusted network, either wired or wireless, you should establish a secure connection using the WiscVPN service. Even seemingly trustable networks, like the campus wireless hotspots, don't provide the security of WiscVPN.
- Do not use kiosks to access any work or personal accounts and services. This excludes DoIT managed kiosks available for use around campus as they are connected to the secure campus network. However, make sure you remember to log off after each session.
- Contact your local IT staff or the DoIT Help Desk if you have any issues with WiscVPN or other computer security tools such as antivirus and firewalls.
Stolen Device Stats
Below are statistics from University of Wisconsin Police Department regarding the reporting and recovery of stolen devices.
|Year||Laptops Stolen||Laptops Recovered||Cells Stolen||Cells Recovered||Tablets Stolen||Tablets Recovered||Desktops Stolen||Desktops Recovered|
According to UW Police "very few desktops stolen, while portable devices and cell phones are way up there. Vast majority of these thefts are opportunistic, where the thief sees an item unattended and unsecured."