Skip to Content, Navigation, or Footer.

Staying protected online, a guide to cybersecurity

Cybersecurity experts give advice on protecting online information

Community-Cybersecurity-tips.png

"Three main cybersecurity themes frequently identified is: protect yourself through passwords and authentication methods, have the ability to identify methods in which threats present themselves and be able to use resources to increase your understanding of potential threats and vulnerabilities."


In the modern world, protecting your cybersecurity is comparable to protecting your physical security. Threats exist in the digital world in the same way that threats exist in the natural world. Technology users should make sure to stay knowledgeable about online threats and have the tools to protect themselves. 

Martin Denis, a cybersecurity specialist and a senior studying information technology, said cybersecurity is defined as having awareness of threats and being able to prevent hackers from obtaining access to data. 

Three main cybersecurity themes frequently identified are: protect yourself through passwords and authentication methods, have the ability to identify methods in which threats present themselves and be able to use resources to learn and adapt to potential threats and vulnerabilities. 

Passwords & authentication methods

A common misconception from students is that stronger passwords have different cases, special characters and numbers, according to Yan Shoshitaishvili, an associate director for the Center of Cybersecurity. However this is not the case.

"The only thing that really matters for a password, from a cracking perspective, is the length," Shoshitaishvili said. 

Using a unique, sentence-long password for each platform can be more effective at protecting information.

Password managers are tools to help remember numerous sentence-long passwords. Zion Basque, a graduate service assistant at the Center for Cybersecurity, said some recommendations are Keychain by Mac Operating Systems, Credential Manager from Windows, and the third-party service LastPass

These programs keep track of the various passwords that are used on different websites and act as a virtual key-ring to hold onto all of the passwords and pull up the passwords when requested. 

Another way to protect sensitive information is through multi-factor authentication. Students at ASU are already using MFA through the Duo two-factor authentication app, which protects students' and faculty's data from threats. Shoshitaishvili said by enabling MFA, students are at less risk of being impacted by a typical, large-scale hack of sensitive information.

"(MFA) takes you from zero to 90 in terms of security," Shoshitaishvili said. 

Identify threats

A key step in threat prevention is threat identification. Hackers are now starting to use new AI technology to make scams seem more realistic, according to Basque. Despite this, there are many common practices of hackers and threats that students should be aware of. 

One practice is phishing. Phishing is when fraudulent communications are made with the intent to obtain sensitive information from a target. The practice often presents as deceptive links or attachments in emails. 

"Be more vigilant and be more cautious when you're receiving emails, especially if you don't know where the source is from," Denis said. 

Ultimately, be aware that emails or calls could be scams. Be skeptical and use good judgment. 

Another threat that students may face is vulnerabilities within their software. Threat actors are constantly looking for flaws and vulnerabilities in software. Developers are constantly working to try to fix any loopholes in the programming, Denis said. By keeping applications and devices up to date with the newest software, students are protected from potential threats. 

Resources

Sun Devils have access to many resources created to keep their information secure. 

The ASU Get Protected program is a website with tools to help students attain services, understand policy and receive training with a focus on cybersecurity. The program is a one-stop-shop for all information that students could want on information security and how to stay protected online. 

The goal of the ASU Experience Center is to help students and faculty get answers to their questions, and questions about cybersecurity is no exception. The Experience Center has many in-house resources that are put toward helping students in any way they need. Through this website, students can either visit the service center or get information straight from the General Technology Services page. 

A final resource that the ASU community can use to help protect themselves from online threats is the email address: ReportPhish@asu.edu. The email reviews suspicious emails and can help stop phishing attacks against students. Cybersecurity experts are on the other end and can provide information or instruction based on the request given. 

ASU increasingly uses online tools to enhance education and productivity. However, there are threats to the online security of the ASU community. Luckily, experts have developed three practices to bring into daily life to protect sensitive information online. 

Edited by Senna James, Sophia Ramirez and Madeline Schmitke.


Reach the reporter at kagore1@asu.edu and follow @kategore_17 on X. 

Like The State Press on Facebook and follow @statepress on X.


Continue supporting student journalism and donate to The State Press today.

Subscribe to Pressing Matters



×

Notice

This website uses cookies to make your experience better and easier. By using this website you consent to our use of cookies. For more information, please see our Cookie Policy.