Digital Security Best Practices

Be vigilant about who has access to your data/information! IT at Rhodes College will NOT ask for this type of Information!

Be aware when you receive emails that look legitimate, but is requesting personal information from you, especially emails that look as if they are coming from IT at Rhodes College:

  • IT will never ask you for your social security number via email
  • IT will never ask you to login to an unsecure website (no https\\:) to provide personal information
  • IT  will never ask you for credit card numbers or other financial information
  • IT will never ask you via email for your current password to login to your Rhodes information.  If you have issues with logging in to Rhodes systems, IT will more than likely assign a new password to you rather than ask for your current password

Password Safety and Best Practices

  • Create a Strong Password and Don’t Reuse Them!
  • Easy to remember phrases are recommended. 
  • Use a mix of 12-14 characters, numbers, and symbols.
  • Avoid using easily guessable information like birthdays.
  • Password Management:
  • Regularly update passwords.
  • Use a password manager to store and generate strong passwords.
  • Question: Is it bad to write your passwords down?

Exposing Personal Information - Location Sharing on Social Media in Realtime can be dangerous!

  • When you post a photo with your location on social media, you provide a breadcrumb trail for anyone accessing your posts or profile.
  • By revealing your exact whereabouts, you inadvertently expose personal information that others can exploit. 
  • From your favorite hangout spots to your daily routines, location sharing paints a detailed picture of your life and habits, making it easier for someone to track your movements and gain insights into your personal life.

Broadcasting our whereabouts at all times can aid those who have negative intentions to exploit this information in various ways:

  • Increases the potential for stalking or harassment by tracking your movements, monitor your activities or target you physically or emotionally
  • Looking to see when you are away from your room or apartment, putting you and your property at risk
  • launching “phishing scams” which are targeted attacks like identity theft, which can range from financial loss to damage to your personal/professional reputation
  • Privacy risks where data aggregators can build a comprehensive profile of your online presence by linking your location with other personal information shared on social media

One of the easiest things to do to possibly avoid negative intentions is to: “Delay Your Sharing”! Instead of posting in real-time, wait until you have left that location before sharing!