Someone in your company gets an email. It looks legitimate — but with one click on a link, or one download of an attachment, everyone is locked
out of your network. How do you identify ransomware and what should you do to protect your business? To find out how much you know about ransomware, select the correct response for each question or statement. Additional ResourcesCheck out these additional resources like downloadable guides Get the MaterialsOn this page:
OverviewLike desktop computers, mobile devices (smartphones, tablets, laptops, and notebook computers) are frequently used to access and store both personal and institutional information. However, because of their portability, mobile devices are more susceptible than desktop systems to loss and theft. Following are safeguards you can use to reduce the risk of someone accessing personal and institutional data when your mobile device is lost or stolen. At Indiana University, any faculty or staff member, affiliate, or student-employee who uses a mobile device to access, store, or manipulate institutional data must:
For details, including specific safeguards required for mobile devices, see Mobile Device Security Standard (IT-12.1). Keep your device physically secureThe most effective method of protecting the data on your mobile device is to protect the device itself:
For additional safeguards against data loss and theft, see Laptop and Mobile Device Security. Use data encryption on laptops and notebook computersUsing a whole-disk encryption program is the best safeguard against unauthorized access of data on your laptop or notebook computer. Such applications use strong encryption methods that protect your device's hard drive while allowing you easy access to your data. For disk encryption, UITS recommends the following:
Enable security features on smartphones and tabletsUITS recommends the following mobile operating systems for smartphones and tablets; see the corresponding documents for information about configuring security and encryption settings: Specific security features vary between devices and operating systems. Use whichever features your device offers that provide the best security for your needs:
The following common features are frequently useful, but can also create security risks. You may want to consider disabling them:
Related documents This is document bcnh in the Knowledge Base. |