• Live Chat
  • Report an IT Security Incident
  • Request Help
  • Help & Support
    • Live Chat
    • Request Help
    • Track a Ticket
    • Knowledge Base
    • Getting Started
    • Working/Learning Remotely
    • Computer Labs & Classrooms Information
  • Service Catalog
    • ITS General Help
    • Accounts & Access
    • Communications & Collaboration
    • Computers & Software
    • Information Security
    • Network & Internet Services
    • Professional Services
    • Research Computing
    • Teaching & Learning
    • University Applications
  • About ITS
    • Our ITS Team
    • Strategic Plan
    • Annual Reports
    • Awards
    • Student Employment
  • Working with ITS
    • Architectural Standards Review Board
    • Banner Admin
    • Business Intelligence
    • Data Governance
    • Enterprise Data Integration Services (EDIS)
    • GMU-TV
    • IT Business Analysis
    • IT Security Office
    • Projects & Project Management
    • Technical Business Solution Intake Request Process
  • Alerts & Outages
    • Unplanned Outages
    • Phishing Alerts
    • Maintenance
    • After Action Reports
    • Archives
    • ITS Alerts Sign Up
  • News
    • Bits & Bytes Signup
    • Bits & Bytes Submissions
    • Spotlights
    • Bulletins
George Mason University
  • Live Chat
  • Report an IT Security Incident
  • Request Help
X Hide

Information Technology Services

Skip to content
  • Help & Support
    • Live Chat
    • Request Help
    • Track a Ticket
    • Knowledge Base
    • Getting Started
    • Working/Learning Remotely
    • Computer Labs & Classrooms Information
  • Service Catalog
    • ITS General Help
    • Accounts & Access
    • Communications & Collaboration
    • Computers & Software
    • Information Security
    • Network & Internet Services
    • Professional Services
    • Research Computing
    • Teaching & Learning
    • University Applications
  • About ITS
    • Our ITS Team
    • Strategic Plan
    • Annual Reports
    • Awards
    • Student Employment
  • Working with ITS
    • Architectural Standards Review Board
    • Banner Admin
    • Business Intelligence
    • Data Governance
    • Enterprise Data Integration Services (EDIS)
    • GMU-TV
    • IT Business Analysis
    • IT Security Office
    • Projects & Project Management
    • Technical Business Solution Intake Request Process
  • Alerts & Outages
    • Unplanned Outages
    • Phishing Alerts
    • Maintenance
    • After Action Reports
    • Archives
    • ITS Alerts Sign Up
  • News
    • Bits & Bytes Signup
    • Bits & Bytes Submissions
    • Spotlights
    • Bulletins

How can ITS help you?

Our services are designed to help you succeed at Mason—
search our services, knowledge articles, how to guides, FAQs, and more.

Knowledge Base

Home > Help & Support > Knowledge Base > Security > Highly Sensitive Data > How do I secure my computer?

How do I secure my computer?

The actions listed below should be taken by all computer users, even if you do not have highly sensitive data stored on your computer.

  • Activate a password-protected screensaver
  • Use Strong Passwords for all of your accounts
  • Automatically receive critical updates
  • Use antivirus software and verify proper configuration
  • Back up files as needed
  • Never open Suspicious Emails or Attachments
  • Use SSL or https for online transactions
  • Reformat hard drive if owner changes
  • Use secure shell, https, VPN, or other encrypted client portals for transferring files
  • Follow Best Email Practices
  • Browse safely
  • Use a modern and secure operating system

If you need assistance implementing these steps, contact ITS Support.

Last modified: October 18, 2024

Previous

Data Classification and Storage Requirements

Next

What university policy governs permission to access or store Highly Sensitive Data?

Related articles

  • What university policy governs permission to access or store Highly Sensitive Data?
  • What type of data might appear highly sensitive, but is not subject to the Data Stewardship policy?
  • When must Highly Sensitive Data be protected by encryption?
  • What are some examples of encryption “in transport?"
  • What is encryption “at rest?"

Get Started at Mason

Whether you are a student, faculty, staff member, or a guest visiting the Mason campus, we have resources to help get you started.

READ MORE

Quick Links

Patriot Pass Password Reset
Create a Ticket
Track a Ticket
PuTTY
Cisco AnyConnect VPN

READ MORE

Explore IT Services

A B C D E F G
H I J K L M N
O P Q R S T U
V W X Y Z #

I T S Logo

© 2024 George Mason University
4400 University Drive
Fairfax, Virginia 22030

Follow Us
location pin for in-person IT support   @GeorgeMasonITS
location pin for in-person IT support   @georgemasonits
ITS Support 24/7
   703-993-8870
   Live Chat
  • Webmaster
X

ITS Technical Support Now Available 24/7

Students, faculty, and staff can receive technical support any time—day or night, on weekends, and even on holidays. If you need IT help, call 703-993-8870 anytime or create a ticket.