This page uses javascript to help render elements, if you have problems please enable javascript.
 
You are now inside the main content area
 
 
 
left col

Cyber Safety

Remote Work Security

Empowering Secure Remote Access: Protecting Wherever You Work, Whenever You Connect.

right col
 
left col
right col
 
left col

What is Remote Work Security?

Remote Work Security refers to the tools, and best practices that protect university systems, data, and users when accessing resources from outside the campus network. Whether you're working from home, traveling, or using a personal device, it's essential to maintain the same level of security as you would on campus.

Why Remote Work Security Matters

  • Protects sensitive university data  from unauthorized access.
  • Prevents cyberattacks  that target remote users and devices.
  • Ensures compliance  with CSU, FERPA, HIPAA, and other regulations.
  • Supports continuity  of teaching, learning, and administrative operations.
right col
 
left col

Keep Home Networks Secure

Cyber criminals are always thinking of new ways to break into your computers, online accounts and steal your personal information and financial data.  Here are some simple tips that can help you to defend against them and stay safer online.

Simple Steps Go A Long Way

Information security is not possible without the your cooperation. You can have the best technology in the world protecting end-users in every way and still suffer a security breach!  The tips below can help you keep your information, the Campus information, and devices protected against unwanted visitors.

right col
 
 
left col

Computers & Devices

  • Keep your Operating System and all applications up-to-date, opt in for automatic updates.
  • Install an AntiVirus program and use it to inspect USBs and other external devices which may be infected by viruses and malware.
  • Install apps only from trusted and official sources.
  • Set your mobile devices to lock after a short idle time, and set it to require authentication for unlocking. Use something other than a four-digit PIN.
  • Be very careful what apps you choose to install and pay special attention to what permissions each app is requesting (for example: request access to contacts, photos, location).
  • Create an emergency boot disk for your computer and keep it in a safe place.
  • Avoid rooting or jailbreaking your device.
  • Refuse to purchase poorly-protected devices or devices that can't easily be updated, or no security updates are provided by manufacturer.

WiFi Services

  • Use OpenDNS for DNS name resolution.
  • Use a VPN connection, when on a public network like Starbucks.
  • Turn OFF Wi-Fi, Location Services, and Bluetooth when not in use.
  • Never trust a "free" WiFi to install programs or browse without https.
right col
 
 
left col

Browsers & Data

  • Backup your Documents folder and all directories you save your data in it regularly.
  • Take extra care when installing “Free software”, they always come at a price, most frequently by side installing adware, browser extensions or other software.
  • Be careful what you download, and ask questions about the site you are downloading from.
  • Enable “click to play” for Flash on your browser, so contents need a click to play.
  • If you have multiple users on your device, log out of your browser when done or set up separate accounts for the device.
  • Keep your browser up to date with software and clear your browser cache regularly.
  • Check for HTTPS and use it for purchasing or entering account / user information.
  • Research brower extensions before installing.

Accounts & Online Activity

  • When banking and shopping, Make sure the site is safe. Look for web addresses with “https:” (“http:” is not secure).
  • Sign up for text notification for all purchases and always review your monthly statements.
  • Setup a virtual credit/debit cards with purchase limits if your bank offers it.
  • Provide a secondary email address and mobile phone number while signing up. If you get hacked, you can recover your password from there.
  • Use strong and unique passwords for every device and website. Enable biometrics if supported.
  • Use multi-factor authentication on sites you store your private and sensitive data.
  • Consider separate accounts on your computer for each individual.
  • Assume everything you put on a social networking site is permanent.
  • Delete old and inactive online accounts.
  • Don’t make your photos or videos public on the Internet. Keep them visible only to people you know personally.
right col
 
left col

Working From Home Best Practices

Just as our campus network is a target to computer attackers, so is your home network. Your personal information, accounts, emails, and your systems at home are valuable to cyber hackers.

 

Working with protected data at home

Protected data, especially Level 1 - Confidential Data is restricted.

You may not access this data from your personal devices. Use of USB storage or other removable devices for storing Level 1 data is strictly prohibited as per CSU Information Security Policies.

For more information on Data Classification List read CSUF's data level breakdown.

right col
 
left col

Secure Your Home Network

Configure the network settings

Older Wi-Fi settings use weak forms of encryption, such as WEP. Instead, be sure you are using WPA2, which uses advanced encryption to protect your network activity.

 

Change the default settings

The administrator account is what allows only you to configure the settings for your wireless network. An attacker can easily discover the default password that the manufacturer has provided.

  • Make sure to change the default password.
  • Change the default name of your wireless network, commonly known as the SSID.
  • Choose a name that cannot be tied back to your address or your family name.
  • Disable WAN access to router configuration page.

 

Device Security

General Guidelines

It is highly recommended that you use a campus issued laptop to access campus sensitive data for best security. You can improve the security of personal devices by following the below guidelines. 

  • Never leave your devices in the car.
  • Ensure your devices are running the most current version of the operating system.
  • Avoid downloading and installing non-campus supported software.
  • Enable automatic updates for operating systems and applications.

 

Protect with Antivirus 

Campus Issued Laptop

Personal Computer Recommendations

 

Storing Files

Use Cloud Storage (Dropbox) instead of USB or local hard drives

  • We recommend Dropbox as a place for you to save your documents. Personal cloud storage accounts or your personal hard drive are not acceptable for university data.
  • Save your work frequently  to your cloud folders.
  • Keep Campus data on campus issued laptop or Dropbox.

 

Campus VPN Required

To access your on-campus computer, use GlobalProtect VPN with Duo MFA. Make sure you are using Microsoft Remote Desk Protocol (RDP) software on both Windows and Mac machines.

 

General Security Practices

Identify Social Engineering Attacks

First and foremost, technology alone cannot fully protect you, you are the best defense. Attackers have learned that the easiest way to get what they want is to target you by attempting to trick you into clicking on a link or attachment. The most common indicators of a social engineering attack include:

  • Urgency: Messages or calls that create a sense of urgency, often through fear, intimidation, a crisis, or an important deadline. Scammers are good at creating convincing messages that appear to come from trusted organizations, such as banks, government, or international organizations.
  • Unsolicited Requests: A message or phone call that pressures someone to bypass or ignore security policies and procedures to submit personal or financial information. 
  • Unusual Wording: A message from a friend or co-worker in which the signature, tone of voice, or wording does not sound like them.

 

right col
 
left col
right col
 
left col

International Travel Best Practices

International travel presents additional risks related to the theft of sensitive data and exposure to malware that can be harmful while traveling and upon your return. Depending on your destination some services may not be available or may work differently. Traveling on campus business that requires you to use your devices will need some extra steps to ensure you have a smooth and productive trip.

right col
 
left col

Before you depart

Device Readiness

  • If you access sensitive data from your campus issued laptop, we recommend you request a loaner device when traveling. Please contact the IT HelpDesk to request a loaner device.
  • Ensure antivirus, security patches, and firewall are enabled and up to date.
  • Backup your data. Level 2 and 3 data can be stored in Dropbox. Please contact IT Helpdesk if you need to backup Level 1 data.
  • Remove all sensitive data and any information that is not needed.

 

Authentication & Campus Access

Install the DUO app on mobile devices. Note there may be restrictions depending the destination. Check the DUO support site for current information.

  • Users with an IP address from OFAC regulated countries and regions will be unable to access Zoom services.  To comply with economic and trade sanctions enforced by the U.S. Office of Foreign Assets Control, DUO and Zoom have announced that they are no longer offering their services to users whose IP addresses belong to an OFAC restricted country or region. For more information on Zoom restrictions, visit the Zoom support website.
  • If you are not using the mobile app, contact the IT HelpDesk and request a token.
  • Test your DUO authentication with the devices you will be taking with you.
  • Install and configure GlobalProtect, the campus VPN software. If you do not currently have that you can request GlobalProtect. To protect against eavesdroppers on networks during your trip, install and configure GlobalProtect to utilize full tunneling. The url for full tunneling is gpft.fullerton.edu.

 

Software Availablity and Restrictions

Check for Import restrictions on encryption software

  • Many foreign countries do not permit encryption software to be imported or used without prior approval.
    • For example, China requires international travelers to apply for a license to use encryption software before arrival. To learn more about background information and details of import restrictions on encryption software, follow the links below to external websites:
    • Wikipedia article discussing restrictions on encryption software import.
    • Crypto Law Survey website with a list of countries and their respective encryption software import restrictions.
  • If you are not able to use encryption software at your destination, it is strongly recommended to leave your data and device at home, and bringing a loaner device instead. If your information is sensitive and it is illegal to secure your devices/data and communication, contact the Information Security office (iso@fullerton.edu) for advice.

Be aware Canvas is inaccessible from countries & regions embargoed by United States regulations.

 

While you're traveling

Going Online

  • Use VPN to access CSUF resources.
  • Do not plug in untrusted accessories (flash drives, charging cables, memory cards).
  • Do not join networks automatically; turn off wireless, Bluetooth, and GPS when not being used.
  • Assume Wi-Fi is insecure, utilize VPN and Eduroam when possible. Check for Eduroam availability.

 

Web Browsing

Practice safe web browsing. This threat of malware infection is magnified during foreign travel as you connect to public networks in hotels, airports, cafes, etc at your destination. To protect yourself while browsing websites abroad:

  • Connect to HTTPS websites. Before sending or receiving any sensitive information, make sure the internet address (URL) in the web browser starts with HTTPS.
    • If your browser displays an error about the digital certificate used to encrypt the data, i.e. that it cannot verify the identity of the HTTPS website, you should assume the site is fake, compromised or the web traffic is being intercepted.
    • Stop connecting to the website and try it from another location.
  • Do not click on suspicious links or prompts.
    • Malicious websites commonly craft attacks to exploit a user’s curiosity, impatience or to scare them with malware threats.
    • These malicious attacks might come in the form of links or pop-ups that present free offers too good to be true or imminent malware infection if you don’t install the product. Think before you click a link or “Yes” to a prompt.
  • Clear all browser cache after use on devices that do not belong to you.
    • Web applications can leave cookies or other information even after log out.  Clear the history, cookies, cache, and other information from the browser after finishing.
    • Do not assume incognito browsing is erasing browser data.

 

When you return

  • Avoid immediately connecting to personal or business networks.
  • If you traveled with your Campus issued laptop, contact the IT Helpdesk for assistance in scanning for vulnerabilities.
  • If you had a loaner device, return it to IT Helpdesk. The loaner device will be wiped and reinstalled.
  • Change the passwords for all accounts used during your travel.

 

right col