Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The following article contains information on computer and network security from malware, spyware, scareware, viruses and phishing schemes. Following these recommendations will not keep you 100% safe, but it will reduce potentially unwanted risks to your personal data and your computer.

...

Passwords are your first line of defense when it comes to computer and network security. Do not share your password with anyone. Do not write your password down in a place easily accessible to others. If you believe your password has been compromised, change your password immediately. 

Importantly, do not reuse your passwords! Data breaches will definitely happen. If you have a unique password for every site, service or device that requires one any data breach will likely not have far reaching consequences for you. If that seems daunting, trying using a password management program. We recommend two of them, 1Password and LastPass. 

Password length is often times more important than complexity. For important services, a password of at least 12 characters, but ideally 15 is currently recommended (as of 2019). Decryption programs continue to get better and better with time, requiring a longer and longer password for added protection. Better than just having a password though is to enable multi-factor authentication on any site, service, etc that offers it. The tenant of multi-factor is it combines something you know (your password) with something you have (like your cell phone for example). 

Be Vigilant...

...

Don't Just Click!

The first rule of computer security can be summed up with this statement, Just don't click. Internet scams are incredibly prevalent and the best way to protect yourself is to never click a link in an email, social networking message or reply to an email/message requesting personal information. This includes account numbers, account names (usernames), passwords, ID numbers, Social Security numbers, date of birth or anything you would consider personal information. A majority of emails requesting personal information are known as Phishing emails. They appear to be from a trusted and established organization; in reality they are an attempt to gain access to your account or steal information. This also applies to websites; be wary of free offers and contests. Do not click or reply if you are unsure of its source or why you got it!

...

Third-party firewalls, such as those provided by Internet security suites, are very comprehensive, but have been known to cause connection problems when accessing secure Bethel University websites from off-campus. In these situations, resolving the problem will require students to work with the software maker or to disable the software when accessing Bethel University Resources.

VPN Services

Employees at Bethel University have access to our VPN service, Cisco Any Connect. This will enable all internet traffic to be routed through our campus security appliances for your protection. Its required for off-campus access to our secure file storage network and recommended for use on any network that you do not otherwise trust (i.e., the free wifi at your local coffee house of choice).  Its also the ideal way to safely browse the internet while abroad and will pull an IP address from our network, effectively "masking" your devices as being in the U.S. 

For students, the Help Desk recommends using a paid-for service. There are many VPN services out there and our current suggestion is NordVPN. Its a good product and works well to allow both safe, but also relatively fast browsing. One of the down-sides of a VPN service is that it can constrict the bandwidth you are able to use - making your browsing experience slower.