WSU Cougar Head Logo Washington State University
WSU Insider
News and Information for Faculty, Staff, and the WSU Community

cybersecuritytips

Cyber security summary

Over the past several months, a series of announcements has been published on cyber security and steps that you can take to safeguard yourself, your home, and the university from cyber-attacks. If at any time you want to review the information from the announcements or share with others, simply go to wsu.edu and search for […]

Cyber security tips: Physical security

Physical security is an important part of cyber security. Bad actors can locate physical files disposed of or stored improperly in easily accessible locations, garbage cans, dumpsters, or even copy machines or other devices no longer in use. To keep university data secure, take the following steps: Ensure only authorized personnel access secure locations: BPPM […]

Cyber security tips: Incident response

Even with good defenses and workforce training, the university may still get hacked or have data compromised. Devices can be lost or stolen or an email with sensitive information can go to the wrong person. In accordance with Executive Policy (EP) #8 University Data Policies, every effort must be made to ensure the availability, accuracy, […]

Cyber security tips: Technology alone won’t protect you

When it comes to thwarting the attempts of cyber attackers, you are the university’s best defense! Although technology such as firewalls, antivirus, encryption, etc., are key to maintaining a safe and secure working environment, they cannot protect against all attacks such as viruses, ransomware, and trojans. Any operating system can become infected. Ensure that your […]

Cyber security tips: Social engineering and personalized attacks

Attackers obtain your personal information through publicly available sources such as social media sites or may purchase personal information online. This information is then used to personalize their social engineering scams. They may try and trick you into believing that they have information that would be detrimental if released or that they somehow already have […]

Cyber security tips: Insider threat

Insider threats are people with legitimate access to the university network who use their access in a way that causes harm. Insider threats are difficult to detect and can go unnoticed for months or years. Whether the insider is a malicious employee or a contractor with compromised credentials, the university and university employees must stay […]

Cyber security tips: What’s an endpoint?

You may have seen the recent announcement on cyber security tips for working remotely and noticed several references to endpoints. As we have received follow-up questions about endpoints, we would like to take this opportunity to provide clarification. An endpoint is a remote computing device that communicates back and forth with a network to which […]

Cyber security tips: Creating a cyber secure home

Cyber security is just as important at home as it is at work and is key if you are working remotely. Take steps to secure your network. Your wi-fi router is what controls your wireless network, and it most likely came with a default username and password: Change the password to a unique password that […]

Cyber security tips: Working remotely

As some university employees continue to work remote or hybrid schedules, please keep the following ITS Remote Work Guidelines in mind when working remotely: Personally owned devices used for university business should not be shared with others. Operating systems and applications must be up to date. All security patches must be up to date and […]

Cyber security tips: Family Educational Rights and Privacy Act (FERPA)

The Family Educational Rights and Privacy Act (FERPA) affords students certain rights with respect to their educational records, such as the right to review their records, right to request an amendment to their records, etc. Student education records include any information that can be connected to an identifiable student except for directory information. See WSU […]