ŗŚĮϲ»“ņģČ

Skip to main content
  • Home
  • About
  • Faculty Experts
  • For The Media
  • ’Cuse Conversations Podcast
  • Topics
    • Alumni
    • Events
    • Faculty
    • Students
    • All Topics
  • Contact
  • Submit
  • All News
  • Arts & Culture
  • Business & Economy
  • Campus & Community
  • Health & Society
  • Media, Law & Policy
  • STEM
  • Veterans
  • University Statements
  • ŗŚĮϲ»“ņģČ Impact
  • |
  • The Peel
Sections
  • All News
  • Arts & Culture
  • Business & Economy
  • Campus & Community
  • Health & Society
  • Media, Law & Policy
  • STEM
  • Veterans
  • University Statements
  • ŗŚĮϲ»“ņģČ Impact
  • |
  • The Peel
  • Home
  • About
  • Faculty Experts
  • For The Media
  • ’Cuse Conversations Podcast
  • Topics
    • Alumni
    • Events
    • Faculty
    • Students
    • All Topics
  • Contact
  • Submit

Protecting Your Devices and Data

Monday, October 21, 2013, By Christopher C. Finkle
Share

Otto_Fighting-Infection_800px_RGBSecuring your personal computer, tablet and smartphone—and the data they contain—is an ongoing process. The following steps and precautions can protect you from identity theft and data loss by drastically reducing the likelihood that your device will be hacked, infected by malware or stolen or irretrievably lost.

Guard against hackers and malware

  • Use anti-malware software (even on Macs). These programs work to protect you against viruses, worms and other types of malicious software trying to infect your device. Typical anti-malware software will do regular full system scans, ā€œpassiveā€ protection in which they are always running, and email, browser and removable media monitoring.Ā  Make sure they are set to automatically check for updates at least once a day. ITS recommends , a free download for Windows 7, Windows Vista and Windows XP. Windows 8 comes with Microsoft Security Essentials built in. For Macs, ITS recommends and .
  • Turn on your firewall and automatic updates. Firewalls protect against threats from the Internet. For instructions on turning on firewalls for different types of computers, visit and enter ā€œfirewallā€ in the search box. Automatic updates enable your computer to automatically download the newest software patches and fixes. Enter ā€œautomatic updatesā€ in the Answers search box (see above) for instructions for your computer.
  • Keep browser, programs and plug-ins up-to-date. Java, Shockwave, Flash, Adobe and others have all probably prompted you for updates. Outdated applications and plug-ins are the most common attack vector for hackers and malware. is a useful program for updating all of your applications and plug-ins at once, free of bundled software and via trusted channels.
  • Download software only from trusted sources. Don’t get your software from mass software download websites, or via email links; instead go straight to the publisher. Mass download websites often make you unintentionally download a malicious program. Other times they will just bundle adware right in with your download.
  • Keep your private information private. Be very cautious about displaying identifying details about yourself, and your friends and family publicly on the internet, especially on social networking sites. Studies have shown that people may be uniquely identified with as little as gender, birth date and zip code. With just that information, identity thieves and marketing firms can use or profit from your identity.
  • Use two-factor authentication whenever possible. Two-factor authentication can be described as ā€œsomething you have and something you know.ā€ You already know one thing—your password. However, that knowledge can be given away, stolen or lost. The second factor is usually a randomly generated number or code that you enter along with your log-in credentials. This code comes from either a device you already own (or ā€œhard token,ā€ given to you by a site administrator) or via a text message sent to your phone (or ā€œsoft token,ā€ sent to the phone number you embedded in your site profile). Only someone who has your device will be able to log into an account with two-factor authentication enabled.
  • Avoid ā€œfreeā€ internet connections. Free or open internet connections—almost always WiFi—like those offered by cafes and airports are often unencrypted. That means that your data isn’t secure or protected, and is exposed to others using the same network. If you need to connect when you’re away from ³§±«ā€™s secure networks, use , which extends the SU network through a virtual private network (VPN) to your device.

Prevent device theft and personal vulnerability

Studies show that more than 2 million laptops are stolen each year. The mobility of phones, tablets and laptops make them an easy target. You can protect your devices and yourself from theft, data loss and stolen identity by following this advice.

  • Keep it safe. Don’t leave your device alone, even for a minute. If you’re not using it, lock your device in a cabinet, drawer or use a security cable. Security cables and locks are sold at the .
  • Make your device different than everyone else’s. This makes it less attractive to someone who might steal it and say they thought it was theirs. Unique markings make the device harder to resell, so it’s less likely to be stolen. Use a permanent marking, engraving or tamper-resistant commercial asset tags. Don’t use your Social Security Number. have proven to be effective.Otto_Locked-laptop_500px_RGB
  • Delete personal information from your device. Search your device for personal data and delete it. This includes your social security number, credit card numbers, net ID’s, passwords and other personally identifiable information. Someone who steals or finds your device can use this information to steal your identity and access your accounts.
  • Back up your data often. Keep a copy of important files from your device on an external drive, or an online cloud service. Your photos, papers, research and other files are irreplaceable and losing them may be worse than losing your device.
  • Encrypt your information. Protect your personal data with the built-in disc encryption feature included with your computer’s operating system. These programs .
  • Register your device with its manufacturer to increase the chance you’ll get your device back if it’s stolen or lost. Registering will ā€œflagā€ a device and if someone else sends it in for service, you should be contacted. If your device is stolen or lost, notify the manufacturer right away.
  • Record and store the serial number and network card serial number (also known as MAC address) of your device. On tablets and handhelds this is called a WiFi address. These numbers are visible to network administrators, making it easier to find and identify your device if it is stolen. Learn how to find your MAC address
  • Install and use device tracking and recovery software, like or . Some software comes with remote wipe capabilities. This feature allows you to log onto an online account and delete all the information from your laptop. There are both paid and free versions of this type of software, and each provides different levels of features. Search online to find the best combination of cost and functions to meet your needs.

If your device is stolen or lost

  • Contact: ³§±«ā€™s Department of Public Safety (DPS) at 005 Sims Hall, 315-443-2224.
  • Email ³§±«ā€™s Information Technology and Services Department (ITS). Their networking team may be able to find the missing device.
  • Quickly contact both DPS and the ITS networking team with as much as you know about the device. Your speedy report will increase the likelihood that your device will be recovered and may help others from becoming victims.

Stay informed

To receive timely notification from ITS of current information security updates and news follow SecurecUse on and . For more about information security, visit .

Find out more!

As part of ³§±«ā€™s observance of National Cyber Security Awareness Month, join ITS’s Information Security team at a live workshop on Oct. 29. The workshop will feature a talk byĀ Christopher Croad, director of information security, and demonstrations of security threats and ways you can counter them. The hour-long workshop will be held in room 304 in the Schine student Center at 11:30 a.m., and includes pizza and great giveaways for all attendees.

Ashley Graves contributed to this article.

  • Author

Christopher C. Finkle

  • Recent
  • Live Like Liam Foundation Establishes Endowed Scholarship for InclusiveU
    Tuesday, May 13, 2025, By Cecelia Dain
  • ECS Team Takes First Place in American Society of Civil Engineers Competition
    Tuesday, May 13, 2025, By Kwami Maranga
  • Years of Growth Fueled Women’s Club Ice Hockey Team to Success
    Tuesday, May 13, 2025, By Samantha Perkins
  • Utility Projects to Begin on Campus This Week; Temporary Closures and Detours Expected Throughout the Summer
    Monday, May 12, 2025, By Jennifer DeMarchi
  • Student Speaker Jonathan Collard de Beaufort ’25: ā€˜Let’s Go Be Brilliant’ (Video)
    Monday, May 12, 2025, By Kathleen Haley

More In STEM

ECS Team Takes First Place in American Society of Civil Engineers Competition

Civil and environmental engineering student teams participated in the American Society of Civil Engineers (ASCE) Sustainable Solutions and Steel Bridge competitions during the 2025 Upstate New York-Canada Student Symposium, winning first place in the Sustainable Solutions competition. The symposium was…

Chloe Britton Naime Committed to Advocating for Improved Outcomes for Neurodivergent Individuals

Chloe Britton Naime ’25 is about to complete a challenging and rare dual major program in both mechanical engineering from the College of Engineering and Computer Science and neuroscience from the College of Arts and Sciences. Even more impressive? Britton…

Graduating Research Quartet Synthesizes Long-Lasting Friendships Through Chemistry

When Jesse Buck ’25, Isabella Chavez Miranda ’25, Lucy Olcott ’25 and Morgan Opp ’25 started as student researchers in medicinal chemist Robert Doyle’s lab, they hoped to hone their research skills. It quickly became evident this would be unlike…

Biologist Reveals New Insights Into Fish’s Unique Attachment Mechanism

On a wave-battered rock in the Northern Pacific Ocean, a fish called the sculpin grips the surface firmly to maintain stability in its harsh environment. Unlike sea urchins, which use their glue-secreting tube feet to adhere to their surroundings, sculpins…

Distinguished ECS Professor Pramod K. Varshney Establishes Endowed Faculty Fellowship

Distinguished Professor Pramod K. Varshney has exemplified Orange excellence since joining the University as a 23-year-old faculty member. A world-renowned researcher and educator, he’s been recognized for his seminal contributions to information fusion and related fields, introducing new, innovative courses…

Subscribe to SU Today

If you need help with your subscription, contact sunews@syr.edu.

Connect With Us

For the Media

Find an Expert
© 2025 ŗŚĮϲ»“ņģČ. All Rights Reserved.