Information System and Technology Department Updates

Network Upgrades & Outages: IST will be working on replacing network equipment over the next couple of weeks and months. These upgrades will require temporary outages (no access to network, phone, or wifi), but will only be for a short time. The impacted areas will be communicated to letting them know the exact date and time. Office 365 Notice: During Spring Break, the plan for all faculty, staff, and students will be to have multi-factor authentication turned on for their Office 365 accounts (if not turned on currently). You can expect to be prompted to set up a validation confirmation option when accessing your Office 365 account online the next time. Also, if you are currently using a mobile app for your Judson email, you may be prompted for an app password which will be provided to you during the Office 365 online multifactor authentication setup process. Click here for more detailed instructions on how to set up your 2-factor authentication in Office 365.

Security Tip: Here are 10 Cyber security tips to practice while using the internet.

1. Using encrypted and secured websites
Make sure that the website you are visiting is encrypted and secure. Several unsecure websites act as the main breeding hubs for data thieves and potential hackers. Only browse websites with URLs that begin with “https” to protect from data leaking. Similarly, have a look at the privacy policies of the apps before using them.

2. Always use two-factor authentication
Two-factor authentications are one of the best methods to help secure your accounts. This method provides two layers of security measures so if a hacker can accurately guess your password, there is still an additional security measure in place to ensure that your account is not breached. To secure your digital accounts, make sure to turn on the two-factor authentication method. This will notify you about possible intruders and privacy invaders.

3. Using strong passwords
Use only strong and unique passwords that cannot be guessed in the first many attempts. Use numbers, symbols, and other characters in your password, and avoid using your personal info like name, phone number, and date of birth as your password.

4. Double check before clicking on anything
Never click on suspicious links that are sent by strangers and do not reply to messages from unknown sources. Make sure the URL is encrypted and protected before clicking on it.

5. Secure your social media
Make sure your social media accounts are well protected by strong passwords. Do not add unknown people to your lists or do not immediately click on the sources shared on social media platforms. Regularly monitor your accounts so that you can check for and report suspicious activities.

6. Look Out for Phishing Scams
The best way to be on the lookout for phishing scams is by avoiding emails from unfamiliar senders, looking for grammatical errors or any inconsistencies in the email that looks suspicious, and hovering over any link you receive to verify what the destination is.

7. Keep Up with Updates
Update your devices and software regularly to keep them protected. Regular software and device updates will keep your devices secure from software malware. Devices and software introduce new changes or troubleshoot any errors found in the devices. Hence it is very necessary to keep your devices updated.

8. Connect Securely
Only connect to private networks when possible, especially when handling sensitive information. Never connect to an unsecured open network unless it’s provided by trusted sources like the government.

9. Back-Up Your Data
Always keep back-up of your data. These days you can easily find affordable storage devices. Remember, malicious threats and hackers don’t always want to steal your data, but sometimes the end-goal is to encrypt or erase it. Back it up to have an ultimate recovery tool.

Scroll to Top