Technology Security Best Practices


  • Lock your devices

    • Never leave your device unattended. Lock your screen every time you step away from your computer.

  • Know how to identify suspicious emails “SLAM

    • Be wary of emails or calls that require “immediate action” or ask for personal information. Carefully inspect links to make sure they point to a reputable site before clicking and never respond to messages asking for your username and password (we will never ask for this information). Report suspicious emails to [email protected]

    • Sender: Check the sender’s email address

    • Links: Hover and check any links before clicking

    • Attachments: Don’t open attachments from someone you don’t know or attachments that you weren’t expecting

    • Message: Check the content of the message and keep an eye out for bad grammar or misspellings.

  • Monitor your accounts

    • If you start seeing suspicious activity or something unfamiliar, it could be a sign your account has been compromised. This could be emails in your sent folder you did not send, duo two-factor “approve” notifications when you did not sign in, or browsing history that doesn’t match your activity.

  • Be alert

    • Always be alert! Use common sense when clicking links, opening attachments, visiting websites, or responding to emails. Be conscious of what you plug into your computer, as malware can be spread through infected flash drives and cell phones.

  • Protect your passwords

    •  Make sure passwords are complex, never shared, and never written down.



Additional Resources: