Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • 5 Active Malware Campaigns in Early 2025: What You Need to Know
    • 10 Critical Network Pentest Findings IT Teams Overlook
    • Report Phishing Instantly with PhishAlarm
    • Password Reuse Epidemic: Nearly Half of User Logins Compromised
    • Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??
    • Stay Ahead of Scammers in 2025
    • Cybersecurity Alert: Risks of Abandoned Websites
    • DHS Unveils Playbook for the Deployment of Artificial Intelligence for the Public Sector
    Fordham University Information Security and Assurance
    • Information Security and Assurance Homepage
    • Privacy Blog
    • About
    Fordham University Information Security and Assurance
    You are at:Home»Cyber Security Awareness Month Tip»Tip #5 What’s that person doing in my computer?
    Cyber Security Awareness Month Tip

    Tip #5 What’s that person doing in my computer?

    By Elizabeth CornellOctober 7, 2015Updated:December 11, 20172 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Copy Link
    Fordham IT staff take "Innovation Walks" to disconnect from the online world and get some exercise.
    Fordham IT staff take “Innovation Walks” to disconnect from the online world and get some exercise. Disconnecting your computer from the network and disconnecting from your computer can have positive benefits.

    It’s one thing to lend your smartphone to a friend to make a quick call, or share a computer with your family at home. It’s an entirely different matter when a stranger gains remote access to one of your devices.

    You can prevent that from happening by disconnecting your computer from the Internet when you’re not using it.

    Staying connected online all the time is easy and convenient. But a 24-hour connection increases your chances of an attacker or virus scanning the network for an available computer. When you’re not using it, turn off your computer or modem, or disable the WiFi connection. Make sure you have your firewall enabled.

    Speaking of firewalls, at Fordham, you can’t even log onto our secured network unless you have firewall installed. This precaution helps keep the networked and wireless connections on all of Fordham’s campuses secure. That’s why we ask you to authenticate (called Network Access Control, or the NAC), each month. We strive to keep our campus’s online environment space safe for you, 24/7.

    Moreover, it’s good to get in the habit of disconnecting. Fordham IT staff often take walking meetings together. Our productivity and enthusiasm improves when we take breaks from our computers and the online world.

    Share this:

    • Click to share on X (Opens in new window) X
    • Click to share on Facebook (Opens in new window) Facebook
    • Click to share on LinkedIn (Opens in new window) LinkedIn

    Like this:

    Like Loading...
    Exploits and Vulnerabilities firewalls networks online safety Wireless
    Previous ArticleView letter – Phishing Email Sent to the Fordham Community on 10/06/2015
    Next Article Tip #6 How to Hide Behind Your Screen Names

    Related Posts

    Password Reuse Epidemic: Nearly Half of User Logins Compromised

    Cybersecurity Alert: Risks of Abandoned Websites

    Incident Response: Why Everyone Needs a Plan for Cyber Threats

    Follow Us on Twitter!
    Follow @FordhamSecureIT
    My Tweets
    Archives
    Categories
    • AI (1)
    • Alerts (384)
    • CISO (19)
    • Cyber Security Awareness Month Tip (150)
    • Data Privacy Week (2)
    • Executive Director (1)
    • Exploits and Vulnerabilities (35)
    • General Information (34)
    • Identity and Access Management (12)
    • Identity Theft (26)
    • Jason Benedict (19)
    • Legitimate Email (14)
    • Malicious Email (24)
    • Mobile (25)
    • Network Security (2)
    • News and Events (143)
    • Newsletter (13)
    • Password (17)
    • Phishing (333)
    • Phishing Email (340)
    • Privacy (10)
    • Ransomware (9)
    • Scam (104)
    • Security Awareness (262)
    • Security Guides (34)
    • Social Engineering (12)
    • SPAM (40)
    • Suspicious (6)
    • Telework (2)
    • Teleworking (3)
    • Trojan (7)
    • Uncategorized (9)
    • Virtual Meeting (4)
    • Virus (28)
    • Viruses (8)
    • World Backup Day (1)
    • Zoom (6)
    Tag Cloud
    Alerts Artificial Intelligence Backups cell phones CISO Cybersecurity Awareness Month Tip Cybersecurity Month Data Privacy Device email Exploits and Vulnerabilities fordham fraud Identity and Access Management Identity Theft Information Security Guides Jason Benedict Legitimate Email malicious email Mobile Multi-Factor Authentication networks Network Security News and Events Newsletter online safety Online Shopping Password Phishing Phishing Email Privacy ransomware scam scams Security Awareness social engineering Social Media spam trojan Virus Viruses Wireless wire transfer scam World Backup Day zoom
    About
    About

    Founded in 1841, Fordham is the Jesuit University of New York, offering exceptional education distinguished by the Jesuit tradition to more than 15,100 students in its four undergraduate colleges and its six graduate and professional schools.

    Copyright © Fordham University
    Facebook X (Twitter) Instagram YouTube LinkedIn
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    %d