ISS Tech Bytes
Lock It! & Stop It!
Volume 4, No. 20
Playing off of this theme during National Cybersecurity Awareness month, ISS reminds everyone to Lock It! & Stop It! (LOCK your computer and STOP account breaches). Even though some employees promote an open door policy when it comes to management, leaving a computer open while unattended is inviting trouble. Remember having a strong password is worthless if accounts are not closed and computers are not locked when unguarded.
Remember: Any activity while logged into your CLU account, whether you know about it or not, is your responsibility.
To secure access to your computer:
· WINDOWS: press CTL+ALT+DELETE on your keyboard and choose Lock Computer. To unlock your computer, press CLT+ALT+DELETE again, and type password. To set a screen saver timeout, Click Start, select Control Panel, and choose Display from the list. Choose the Screen Saver tab, then select a screen saver from the drop down list. Adjust the wait time before the screensaver activates; click the checkbox next to On Resume, display Welcome Screen. Click OK to save.
· MAC: open the Desktop & Screen Saver System Preferences panel, activate the Screen Saver tab, and click the Hot Corners button. Choose which corner of the screen you wish to use, then click the corresponding pop-up menu and select Start Screen Saver. Select a screen saver from the list. Slide the Start Screen Saver ruler to select how long after inactivity the screensaver starts. To activate the screen saver at any time, move the mouse into that corner of the screen; the screen saver will start.
Caution: Avoid removing settings that automatically lock the computer after a period of inactivity; the settings are there to help secure your data.
Check out the CLU cyber security site for more info: http://www.callutheran.edu/iss/technology_services/cybersecurity.php
*This Issue’s Techno Term:
Definition: A set of instructions, sometimes called a procedure or a function, that is used to perform a certain task; the term often refers to tasks that run on a computer, but can also refer to those that occur on other types of systems.
Example in a sentence: Computer hackers are often experts in writing algorithms that cause damage to computer systems.
If you have questions or need assistance, please call the Help Desk at (805) 493-3698 or send e-mail to firstname.lastname@example.org
« Back to Tech Byte Archive