Skip to main content
  • Home
  • About
  • Faculty Experts
  • For The Media
  • ’Cuse Conversations Podcast
  • Topics
    • Alumni
    • Events
    • Faculty
    • Students
    • All Topics
  • Contact
  • Submit
  • All News
  • Arts & Culture
  • Business & Economy
  • Campus & Community
  • Health & Society
  • Media, Law & Policy
  • STEM
  • Veterans
  • University Statements
  • Syracuse University Impact
  • |
  • The Peel
  • Athletics
Sections
  • All News
  • Arts & Culture
  • Business & Economy
  • Campus & Community
  • Health & Society
  • Media, Law & Policy
  • STEM
  • Veterans
  • University Statements
  • Syracuse University Impact
  • |
  • The Peel
  • Athletics
  • Home
  • About
  • Faculty Experts
  • For The Media
  • ’Cuse Conversations Podcast
  • Topics
    • Alumni
    • Events
    • Faculty
    • Students
    • All Topics
  • Contact
  • Submit

Protecting Your Devices and Data

Monday, October 21, 2013, By Christopher C. Finkle
Share

Otto_Fighting-Infection_800px_RGBSecuring your personal computer, tablet and smartphone—and the data they contain—is an ongoing process. The following steps and precautions can protect you from identity theft and data loss by drastically reducing the likelihood that your device will be hacked, infected by malware or stolen or irretrievably lost.

Guard against hackers and malware

  • Use anti-malware software (even on Macs). These programs work to protect you against viruses, worms and other types of malicious software trying to infect your device. Typical anti-malware software will do regular full system scans, “passive” protection in which they are always running, and email, browser and removable media monitoring.  Make sure they are set to automatically check for updates at least once a day. ITS recommends Microsoft Security Essentials, a free download for Windows 7, Windows Vista and Windows XP. Windows 8 comes with Microsoft Security Essentials built in. For Macs, ITS recommends Sophos Anti-Virus for Mac and ClamXav.
  • Turn on your firewall and automatic updates. Firewalls protect against threats from the Internet. For instructions on turning on firewalls for different types of computers, visit Answers.syr.edu and enter “firewall” in the search box. Automatic updates enable your computer to automatically download the newest software patches and fixes. Enter “automatic updates” in the Answers search box (see above) for instructions for your computer.
  • Keep browser, programs and plug-ins up-to-date. Java, Shockwave, Flash, Adobe and others have all probably prompted you for updates. Outdated applications and plug-ins are the most common attack vector for hackers and malware. Ninite is a useful program for updating all of your applications and plug-ins at once, free of bundled software and via trusted channels.
  • Download software only from trusted sources. Don’t get your software from mass software download websites, or via email links; instead go straight to the publisher. Mass download websites often make you unintentionally download a malicious program. Other times they will just bundle adware right in with your download.
  • Keep your private information private. Be very cautious about displaying identifying details about yourself, and your friends and family publicly on the internet, especially on social networking sites. Studies have shown that people may be uniquely identified with as little as gender, birth date and zip code. With just that information, identity thieves and marketing firms can use or profit from your identity.
  • Use two-factor authentication whenever possible. Two-factor authentication can be described as “something you have and something you know.” You already know one thing—your password. However, that knowledge can be given away, stolen or lost. The second factor is usually a randomly generated number or code that you enter along with your log-in credentials. This code comes from either a device you already own (or “hard token,” given to you by a site administrator) or via a text message sent to your phone (or “soft token,” sent to the phone number you embedded in your site profile). Only someone who has your device will be able to log into an account with two-factor authentication enabled.
  • Avoid “free” internet connections. Free or open internet connections—almost always WiFi—like those offered by cafes and airports are often unencrypted. That means that your data isn’t secure or protected, and is exposed to others using the same network. If you need to connect when you’re away from SU’s secure networks, use SURA (SU Remote Access), which extends the SU network through a virtual private network (VPN) to your device.

Prevent device theft and personal vulnerability

Studies show that more than 2 million laptops are stolen each year. The mobility of phones, tablets and laptops make them an easy target. You can protect your devices and yourself from theft, data loss and stolen identity by following this advice.

  • Keep it safe. Don’t leave your device alone, even for a minute. If you’re not using it, lock your device in a cabinet, drawer or use a security cable. Security cables and locks are sold at the SU Bookstore.
  • Make your device different than everyone else’s. This makes it less attractive to someone who might steal it and say they thought it was theirs. Unique markings make the device harder to resell, so it’s less likely to be stolen. Use a permanent marking, engraving or tamper-resistant commercial asset tags. Don’t use your Social Security Number. STOP Theft Tags have proven to be effective.Otto_Locked-laptop_500px_RGB
  • Delete personal information from your device. Search your device for personal data and delete it. This includes your social security number, credit card numbers, net ID’s, passwords and other personally identifiable information. Someone who steals or finds your device can use this information to steal your identity and access your accounts.
  • Back up your data often. Keep a copy of important files from your device on an external drive, or an online cloud service. Your photos, papers, research and other files are irreplaceable and losing them may be worse than losing your device.
  • Encrypt your information. Protect your personal data with the built-in disc encryption feature included with your computer’s operating system. These programs include BitLocker for Windows and FileVault for Macs.
  • Register your device with its manufacturer to increase the chance you’ll get your device back if it’s stolen or lost. Registering will “flag” a device and if someone else sends it in for service, you should be contacted. If your device is stolen or lost, notify the manufacturer right away.
  • Record and store the serial number and network card serial number (also known as MAC address) of your device. On tablets and handhelds this is called a WiFi address. These numbers are visible to network administrators, making it easier to find and identify your device if it is stolen. Learn how to find your MAC address here.
  • Install and use device tracking and recovery software, like LoJack or Prey. Some software comes with remote wipe capabilities. This feature allows you to log onto an online account and delete all the information from your laptop. There are both paid and free versions of this type of software, and each provides different levels of features. Search online to find the best combination of cost and functions to meet your needs.

If your device is stolen or lost

  • Contact: SU’s Department of Public Safety (DPS) at 005 Sims Hall, 315-443-2224.
  • Email SU’s Information Technology and Services Department (ITS). Their networking team may be able to find the missing device.
  • Quickly contact both DPS and the ITS networking team with as much as you know about the device. Your speedy report will increase the likelihood that your device will be recovered and may help others from becoming victims.

Stay informed

To receive timely notification from ITS of current information security updates and news follow SecurecUse on Twitter and Facebook. For more about information security, visit SecurecUse.syr.edu.

Find out more!

As part of SU’s observance of National Cyber Security Awareness Month, join ITS’s Information Security team at a live workshop on Oct. 29. The workshop will feature a talk by Christopher Croad, director of information security, and demonstrations of security threats and ways you can counter them. The hour-long workshop will be held in room 304 in the Schine student Center at 11:30 a.m., and includes pizza and great giveaways for all attendees.

Ashley Graves contributed to this article.

  • Author

Christopher C. Finkle

  • Recent
  • Arts and Sciences Hosts Inaugural Scholarship and Research Gala
    Friday, May 9, 2025, By Sean Grogan
  • Chancellor Kent Syverud Honored as Distinguished Citizen of the Year at 57th Annual ScoutPower Event
    Thursday, May 8, 2025, By News Staff
  • New Maymester Program Allows Student-Athletes to Develop ‘Democracy Playbook’
    Thursday, May 8, 2025, By Wendy S. Loughlin
  • From Policy to Practice: How AI is Shaping the Future of Education
    Thursday, May 8, 2025, By Christopher Munoz
  • Kohn, Wiklund, Wilmoth Named Distinguished Professors
    Thursday, May 8, 2025, By Wendy S. Loughlin

More In STEM

Chloe Britton Naime Committed to Advocating for Improved Outcomes for Neurodivergent Individuals

Chloe Britton Naime ’25 is about to complete a challenging and rare dual major program in both mechanical engineering from the College of Engineering and Computer Science and neuroscience from the College of Arts and Sciences. Even more impressive? Britton…

Graduating Research Quartet Synthesizes Long-Lasting Friendships Through Chemistry

When Jesse Buck ’25, Isabella Chavez Miranda ’25, Lucy Olcott ’25 and Morgan Opp ’25 started as student researchers in medicinal chemist Robert Doyle’s lab, they hoped to hone their research skills. It quickly became evident this would be unlike…

Biologist Reveals New Insights Into Fish’s Unique Attachment Mechanism

On a wave-battered rock in the Northern Pacific Ocean, a fish called the sculpin grips the surface firmly to maintain stability in its harsh environment. Unlike sea urchins, which use their glue-secreting tube feet to adhere to their surroundings, sculpins…

Distinguished ECS Professor Pramod K. Varshney Establishes Endowed Faculty Fellowship

Distinguished Professor Pramod K. Varshney has exemplified Orange excellence since joining the University as a 23-year-old faculty member. A world-renowned researcher and educator, he’s been recognized for his seminal contributions to information fusion and related fields, introducing new, innovative courses…

Earth Day Spotlight: The Science Behind Heat Pumps (Video)

Peter Wirth has a two-fold strategy when it comes to renovating his home. The Brooklyn, New York, native has called Central New York home for more than 40 years. Nestled on a quiet cul-de-sac in Fayetteville, New York, the 1960s-era…

Subscribe to SU Today

If you need help with your subscription, contact sunews@syr.edu.

Connect With Us

  • X
  • Facebook
  • Instagram
  • Youtube
  • LinkedIn
Social Media Directory

For the Media

Find an Expert Follow @SyracuseUNews
  • Facebook
  • Instagram
  • Youtube
  • LinkedIn
  • @SyracuseU
  • @SyracuseUNews
  • Social Media Directory
  • Accessibility
  • Privacy
  • Campus Status
  • Syracuse.edu
© 2025 Syracuse University News. All Rights Reserved.