• Report an IT Security Incident
  • Request Help
  • Help & Support
    • COVID-19 Support
    • Request Help
    • Track a Ticket
    • Knowledge Base
    • Getting Started
    • Contact Us
    • ITS Alerts Sign Up
  • Service Catalog
    • Accounts & Access
    • Computers & Software
    • Email & Collaboration
    • Teaching & Learning
    • Network, Internet & Telephone
    • University Applications
    • Web, Servers & Data
  • About ITS
    • Our Team
    • Strategic Plan
    • Annual Reports
    • Awards
    • Student Employment
  • Working with ITS
    • Solution Request
    • Governance Committees
    • Portfolio and Project Management Office
    • Architectural Standards Review Board
    • Business Intelligence
    • Enterprise Data Integration Services (EDIS)
    • GMU-TV
    • IT Security Office
  • Alerts & Bulletins
    • Unplanned Outages
    • Phishing Alerts
    • Maintenance
    • Bulletins
    • Spotlights
    • After Action Reports
    • Archives
    • Known Issues
  • Report an IT Security Incident
  • Request Help
X Hide

Information Technology Services

Skip to content
  • Help & Support
    • COVID-19 Support
    • Request Help
    • Track a Ticket
    • Knowledge Base
    • Getting Started
    • Contact Us
    • ITS Alerts Sign Up
  • Service Catalog
    • Accounts & Access
    • Computers & Software
    • Email & Collaboration
    • Teaching & Learning
    • Network, Internet & Telephone
    • University Applications
    • Web, Servers & Data
  • About ITS
    • Our Team
    • Strategic Plan
    • Annual Reports
    • Awards
    • Student Employment
  • Working with ITS
    • Solution Request
    • Governance Committees
    • Portfolio and Project Management Office
    • Architectural Standards Review Board
    • Business Intelligence
    • Enterprise Data Integration Services (EDIS)
    • GMU-TV
    • IT Security Office
  • Alerts & Bulletins
    • Unplanned Outages
    • Phishing Alerts
    • Maintenance
    • Bulletins
    • Spotlights
    • After Action Reports
    • Archives
    • Known Issues

Knowledge Base

Home > Help & Support > Knowledge Base > Security > Highly Sensitive Data FAQ > How do I secure my computer?

How do I secure my computer?

The actions listed below should be taken by all computer users, even if you do not have highly sensitive data stored on your computer.

  • Activate a password-protected screensaver
  • Use Strong Passwords for all of your accounts
  • Automatically receive critical updates
  • Use antivirus software and verify proper configuration
  • Back up files As needed
  • Never open Suspicious Emails or Attachments
  • Use SSL or https for online transactions
  • Reformat hard drive if owner changes
  • Use secure shell, https, VPN, or other encrypted client portals for transferring files
  • Follow Best Email Practices
  • Browse safely
  • Use a modern and secure operating system, such as Windows 10, or Mac OSX 10.13 (High Sierra) or later

If you need assistance implementing these steps, contact the ITS Support Center.

Last modified: September 6, 2018

Previous

What university policy governs permission to access or store Highly Sensitive Data (HSD)?

Related articles

  • What university policy governs permission to access or store Highly Sensitive Data (HSD)?
  • What type of data might appear highly sensitive, but is not subject to the Data Stewardship policy?
  • When must Highly Sensitive Data (HSD) be protected by encryption?
  • What are some examples of encryption “in transport?"
  • What is encryption “at rest?"

Get Started at Mason

Whether you are a student, faculty, staff member, or a guest visiting the Mason campus, we have resources to help get you started.

Read More

Quick Links

Patriot Pass Password Reset
Submit a Ticket
Track a Ticket
PuTTY
Cisco AnyConnect VPN

Read More

Explore IT Services

A B C D E F G
H I J K L M N
O P Q R S T U
V W X Y Z #

© 2020 George Mason University
4400 University Drive
Fairfax, Virginia 22030

Latest tweet

George Mason ITSFollow

George Mason ITS
George Mason ITS@GeorgeMasonITS·
8h

Meet Danah Boyd (@zephoria) - technology and social media scholar, Principal Researcher at Microsoft, and the founder and President of Data & Society. Visit her website and learn about her impact in the IT field! #WomensHistoryMonth #WomenInTechnology

⏩https://www.danah.org/

Reply on Twitter 1367177561214750721Retweet on Twitter 13671775612147507211Like on Twitter 1367177561214750721
View All
ITS Support Center
703-993-8870
support@gmu.edu
Monday–Thursday,
8 a.m.–9 p.m.
Friday, 8 a.m.–5 p.m.
Saturday, Closed
Sunday, 1 p.m.–9 p.m.
(closed Thursday 3 p.m.–4 p.m. for a team meeting)
  • Webmaster