Cyber Security

Cybersecurity Best Practices

Protect your personal and institutional information by following these cybersecurity best practices. These steps help reduce the risk of unauthorized access, data loss, and online scams.

Protect Your Device

Install and keep up to date:

  • Anti‑virus software
  • Anti‑malware software

These tools help detect and block harmful software before it can cause damage.

Passwords: Longer Is Stronger

Use passphrases instead of short passwords.

A passphrase is a short sentence or a combination of unrelated words that:

  • Is easy for you to remember
  • Is difficult for computers to guess

Tips for creating strong passphrases

  • Use a mix of upper- and lower‑case letters
  • Include numbers and symbols
  • Avoid personal details such as names, birthdays, or common phrases
  • Do not reuse the same passphrase across multiple accounts

Phishing: If You Suspect Deceit, Delete It

Phishing messages are designed to trick you into sharing personal or sensitive information.

Phishing emails often:

  • Create fear or urgency
  • Ask you to act immediately
  • Request passwords, account details, or financial information

What to do if you receive a suspicious message

  1. Do not reply to the message.
  2. Do not open attachments or select links.
  3. Report the message to the TRC Helpdesk.
  4. Delete the email from your inbox.

Software Updates: Install Now, Not Later

Software updates help fix security vulnerabilities and improve performance.

  • Most major software vendors provide automatic updates.
  • Allow updates to install as soon as they are available.

Important reminder

Be cautious of browser pop‑ups that claim you need to “click here” to update your computer. These messages may be malicious. When in doubt, close the pop‑up and use the official software update feature instead.

Multi‑Factor Authentication (MFA)

Multi‑Factor Authentication (MFA) adds an extra layer of security to your accounts.

MFA requires two or more verification factors, such as:

  • Something you know (a password or passphrase)
  • Something you have (a phone, security key, or app)
  • Something you are (biometric verification, when supported)

Using MFA significantly reduces the risk of unauthorized access, even if your password is compromised.