Golden Rules for Cyber Security at Liverpool Hope University
Use Strong, Unique Passwords & Multi-Factor Authentication (MFA)
- Create Strong Passwords: Always use strong passwords that are at least 12 characters long, with a combination of uppercase and lowercase letters, numbers, and special characters. Avoid using easily guessable passwords (e.g., "Password123").
- Passphrases for Enhanced Security: Instead of using a traditional password, consider using a passphrase - a sequence of random words or a sentence that is easy for you to remember but hard for others to guess. For example, a passphrase like "BlueElephant$JumpingOverLions!" is strong because it's long and includes a mix of characters, but it’s also easier to remember than a random string of characters.
- Never Reuse Passwords: Do not reuse passwords across multiple accounts. If one account is compromised, others may be vulnerable.
- Enable Multi-Factor Authentication (MFA): MFA adds an extra layer of security by requiring additional verification (e.g., a text message code or authenticator app). If MFA is unavailable, increase the length of your password to at least 14 characters.
Think Before You Click – Beware of Phishing & Scams
- Spot Red Flags: Be cautious of unsolicited emails that contain poor grammar, urgent requests, or attachments from unfamiliar sources.
- Hover Over Links: Never click on suspicious links or download unknown attachments. Always hover over links to verify the destination URL before clicking. Ensure the URL is legitimate and matches the intended website.
- Avoid Sharing Credentials: Never share login details, personal data, or financial information via email. If you receive such a request, confirm its legitimacy with IT Services before responding.
- Be Wary of Pop-Ups: Don't engage with pop-up prompts asking for personal information. Legitimate services won't ask for sensitive data through pop-ups.
- Check the Sender's Email Address: Be aware of slight misspellings or suspicious-looking email addresses that mimic legitimate ones.
Keep Your Devices & Software Updated
- Enable Automatic Updates: Always set your devices and applications to update automatically so you receive the latest security patches.
- Update Operating Systems and Apps: Ensure that your operating system, software, and applications are up-to-date - outdated systems have security vulnerabilities that hackers can exploit.
- Use Antivirus Software: Ensure anti-virus and security software is installed and running on all devices to help detect and block threats.
- Patch Vulnerabilities: Promptly install critical security patches for software, web browsers, and operating systems to reduce exposure to known vulnerabilities.
Use University-Approved Systems & Cloud Storage
- Use University Platforms: Store university files on university systems (e.g., Network Drives, Google Drive, OneDrive, Moodle). Do not use personal cloud storage accounts for university-related data.
- Avoid Personal Email for Work: Do not send sensitive university information over personal email accounts, as they may not have the necessary security measures in place.
- Review Third-Party Services: Avoid using unauthorised third-party apps, browser add-ons/extensions, or services for university-related tasks to ensure compliance with security standards.
- Secure File Sharing: Use secure, university-approved file-sharing methods for transferring confidential or sensitive data.
Protect Sensitive Data & Personal Information
- Follow Data Protection Policies: Always adhere to university data protection policies when handling student records, research data, or financial information.
- Secure Communication: Use encrypted methods for sending or storing sensitive data, such as secure email or file encryption software.
- Avoid Unsecure Channels: Never share sensitive personal or university data through insecure channels, like social media, text messages, or personal messaging apps (e.g., WhatsApp).
- Secure Physical Files: Ensure physical documents containing sensitive data are securely stored and locked when not in use.
- Limit Data Sharing: Only share sensitive information when absolutely necessary and ensure the recipient has the appropriate security clearance.
Lock Your Devices & Log Out When Not in Use
- Lock Devices: Always lock your computer, laptop, or mobile device when leaving it unattended, even for a short time (e.g., Windows: Win + L, Mac: Cmd + Ctrl + Q).
- Log Out of Accounts: Always log out of university systems and cloud accounts when you're done, especially if you are using shared or public computers.
Beware of Public Wi-Fi
- Avoid Public Wi-Fi: Public Wi-Fi networks are often unsecured, making it easier for hackers to intercept your data. Avoid accessing sensitive accounts, logging in to systems or making transactions on these networks.
- Disable File Sharing: Turn off file-sharing settings and Bluetooth when using public or unsecured networks to prevent unauthorised access.
Report Security Incidents & Suspicious Activity Immediately
- Report Suspicious Activity: Immediately report any suspected phishing attempts, cyber threats, or security breaches to the IT Services Help Desk (itshelp@hope.ac.uk / 0151 291 2100).
- Signs of a Security Issue:
- You receive a password reset email that you didn't request.
- Unexpected pop-ups or system slowdowns (potential malware infection).
- Unauthorised logins to your university accounts or systems.
- Prompt Action: Reporting issues quickly can help prevent larger security incidents and mitigate risks to the university's systems and data.
Be Cautious with USBs & External Devices
- Avoid Unknown USB Drives: Never plug in unknown USB drives or external devices, as they could contain malware designed to infect your system.
- Scan Before Use: Always scan external devices, including USB drives, hard drives, and other peripherals, for malware before accessing the files.
- Use University-Approved Devices: Only use devices and peripherals that have been authorised by the university to reduce the risk of introducing harmful software.
Stay Cyber Aware & Educated
- Stay Informed: Cyber threats are constantly evolving. Stay up-to-date by attending university cybersecurity training sessions and regularly reading security alerts or updates from IT Services.
- Understand Social Engineering: Be aware of social engineering tactics, where attackers manipulate you into divulging personal information. Always verify the identity of anyone requesting sensitive data.
- Question IT-Related Requests: Be suspicious of unsolicited requests for login details, software installation, or administrative actions. Verify requests with IT Services before proceeding.