Data Security and Travel

— Written By Jeff Ware
en Español / em Português
Español

El inglés es el idioma de control de esta página. En la medida en que haya algún conflicto entre la traducción al inglés y la traducción, el inglés prevalece.

Al hacer clic en el enlace de traducción se activa un servicio de traducción gratuito para convertir la página al español. Al igual que con cualquier traducción por Internet, la conversión no es sensible al contexto y puede que no traduzca el texto en su significado original. NC State Extension no garantiza la exactitud del texto traducido. Por favor, tenga en cuenta que algunas aplicaciones y/o servicios pueden no funcionar como se espera cuando se traducen.


Português

Inglês é o idioma de controle desta página. Na medida que haja algum conflito entre o texto original em Inglês e a tradução, o Inglês prevalece.

Ao clicar no link de tradução, um serviço gratuito de tradução será ativado para converter a página para o Português. Como em qualquer tradução pela internet, a conversão não é sensivel ao contexto e pode não ocorrer a tradução para o significado orginal. O serviço de Extensão da Carolina do Norte (NC State Extension) não garante a exatidão do texto traduzido. Por favor, observe que algumas funções ou serviços podem não funcionar como esperado após a tradução.


English

English is the controlling language of this page. To the extent there is any conflict between the English text and the translation, English controls.

Clicking on the translation link activates a free translation service to convert the page to Spanish. As with any Internet translation, the conversion is not context-sensitive and may not translate the text to its original meaning. NC State Extension does not guarantee the accuracy of the translated text. Please note that some applications and/or services may not function as expected when translated.

Collapse ▲

With our state Extension conference on the horizon, many of us will be traveling, presenting, and working remotely. If you use public Wi-Fi or access points, personal and University-related data on your devices is at risk unless you take steps to protect it. Additionally, the devices themselves are also at risk from theft unless you are vigilant.

Remember, you are ultimately responsible for the security of your computer and University-related data. See the following tips on keeping yourself and your data safe.

Using Your Computer

  1. Make sure your computer and software are current with updates.
  2. Turn off file and printer sharing.
    Instructions for Windows
    Instructions for Mac
  3. Lock or shut down your computer if not actively using it.
  4. Make sure that you know and connect to the correct wireless network. 
  5. Make sure that websites are secure. You should see https:// or a closed padlock in the location bar.
    Secure browser icon image

  6. When using public networks do not make purchases or do online banking. 
  7. VPNs can protect information when on public networks.
    1. You can use a personal VPN service or the NC State University VPN service.
    2. NC State University VPN will protect University sites by default, those sites that require Shibboleth / Duo login.
    3. If you know that in the future it will be necessary to business and online banking while on the road, you need to request access to the University full-tunnel VPN. Everything will pass through the University network.
      CALS IT: What is Full Tunnel VPN and How to Access
      Full Tunnel VPN Access
  8. Protect your smartphone. Make sure it is up to date on OS patches. Unless absolutely necessary, don’t use public charging stations.

Using Other Computers

  1. Use Incognito / Private Browsing mode on the web browser.
  2. Try to not access sites requiring passwords; if you do, make sure to log out of your account when finished and quit your browser.
  3. Use a clean USB thumb drive. Don’t have anything more than the necessary file(s) on the drive. Reformat the thumb drive when done with it.
  4. Do not use the computer USB port to charge your devices or transfer files
  5. Assume the conference room computer and its network is not safe or secure for anything but projecting.

For more on data security, please see the following NC State University resources: