Be Cyber-Smart! 8 Habits to Stay Cyber-Safe | Cyber Security | UC Davis Health

Be Cyber-Smart!

8 Habits to Stay Cyber-Safe

As we grow more dependent upon technology, we need to develop better online security defenses. These eight habits will help you to recognize and counter threats to your digital safety and become less vulnerable to cyberattacks.

  • Arrow icon

    1. Think twice before clicking on links or opening attachments

    Even if an email looks like it's from someone you know, take care with attachments. Take that extra second to avoid walking into a digitally dangerous situation. Don't reply to the email because the sender's identity might have been compromised.

  • Eye icon

    2. Verify requests for private information

    Whenever you are requested to provide private information (yours or anyone else's), verify the identity of the requester — even if it appears to be somebody you know. Con artists are clever in how they collect information to steal information and identities. Even if you think you're safe, regularly check your financial statements and credit reports.

  • Keyhole icon

    3. Protect your passwords

    Never reveal your passwords to anyone. Make them long, strong, unique and use multi-factor authentication (MFA) wherever possible.

    • Use a password manager such as LastPass or RoboForm.
    • Use different passwords for different accounts.
    • Use different passwords for work and home.
    • Don't let apps and websites remember your passwords.
  • Key icon

    4. Protect your stuff!

    Keep a close eye on your belongings when you're in public places. Lock things up or take them with you before you leave, even if you’ll only be away for a second. When you're at work, secure your area and lock your computer screen before leaving your desk. Take your phone and other portable items with you.

  • Circular arrow icon

    5. Keep your devices, browsers, and apps up to date

    At home, automate software updates and periodically restart your devices to ensure that updates are fully installed. UC Davis Health IT manages workstation updates and restarts.

  • Letter L icon

    6. Back up critical files

    Store backups in a physically separate location from the originals and periodically test them. For critical work files, use storage options that are approved by UC Davis Health IT. For personal files, save a backup on a separate drive (e.g., cloud or encrypted USB) to securely store it.

  • Transistor icon

    7. Delete sensitive information when it's no longer needed

    UC employees should follow the UC Records Retention Schedule that defines the period of time that records should be retained and when they should be destroyed.

  • Danger sign icon

    8. If it's suspicious, report it!

    Learn how to recognize suspected scams and other suspicious activities. At work, suspicious emails should be forwarded as attachments to abuse@ucdavis.edu. Report other cybersecurity concerns to the Help Desk: 916-734-HELP (916-734-4357).