{"id":528,"date":"2021-02-17T15:58:20","date_gmt":"2021-02-17T20:58:20","guid":{"rendered":"https:\/\/www3.tusculum.edu\/is\/?page_id=528"},"modified":"2025-04-09T13:45:05","modified_gmt":"2025-04-09T17:45:05","slug":"it-best-practices","status":"publish","type":"page","link":"https:\/\/www3.tusculum.edu\/is\/resources\/it-best-practices\/","title":{"rendered":"IT SECURITY BEST PRACTICES"},"content":{"rendered":"<h3>The following list is provided on the Information Systems website to inform faculty and staff of IT data security best practices.<\/h3>\n<hr \/>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-329\" src=\"https:\/\/www3.tusculum.edu\/is\/wp-content\/uploads\/2012\/03\/tcdis_feature02-300x263.jpg\" alt=\"Tusculum students\" width=\"300\" height=\"263\" srcset=\"https:\/\/www3.tusculum.edu\/is\/wp-content\/uploads\/2012\/03\/tcdis_feature02-300x263.jpg 300w, https:\/\/www3.tusculum.edu\/is\/wp-content\/uploads\/2012\/03\/tcdis_feature02.jpg 570w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<ul>\n<li>Regularly change your password. Do not share password with others and do not write it on a note near your computer.<\/li>\n<li>Save important files to your H: drive.<\/li>\n<li>Avoid uploading and saving important files to consumer sites, such as Dropbox, Google Drive, etc. Use the university network for your file storage.<\/li>\n<li>Be sure to lock your computer when you step away for a meeting, lunch or other activity. Log off at the end of the day<\/li>\n<li>Be very careful when receiving email from supposed University department or officials, especially if the email asks for your password. Tusculum IS will never ask for your password in an email message.<\/li>\n<li>Never click on or open attachments in suspicious emails. If you are unsure of an email\u2019s legitimacy, please contact the IS Help Desk at <strong>423-636-7346<\/strong> or <strong>Ext. 5346<\/strong><\/li>\n<\/ul>\n<hr>\n","protected":false},"excerpt":{"rendered":"<p>The following list is provided on the Information Systems website to inform faculty and staff of IT data security best practices. Regularly change your password. Do not share password with others and do not write it on a note near your computer. Save important files to your H: drive. Avoid uploading and saving important files [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":388,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-528","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IT SECURITY BEST PRACTICES - TUDIS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www3.tusculum.edu\/is\/resources\/it-best-practices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT SECURITY BEST PRACTICES - TUDIS\" \/>\n<meta property=\"og:description\" content=\"The following list is provided on the Information Systems website to inform faculty and staff of IT data security best practices. Regularly change your password. Do not share password with others and do not write it on a note near your computer. Save important files to your H: drive. Avoid uploading and saving important files [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www3.tusculum.edu\/is\/resources\/it-best-practices\/\" \/>\n<meta property=\"og:site_name\" content=\"TUDIS\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-09T17:45:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www3.tusculum.edu\/is\/wp-content\/uploads\/2012\/03\/tcdis_feature02-300x263.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www3.tusculum.edu\/is\/resources\/it-best-practices\/\",\"url\":\"https:\/\/www3.tusculum.edu\/is\/resources\/it-best-practices\/\",\"name\":\"IT SECURITY BEST PRACTICES - TUDIS\",\"isPartOf\":{\"@id\":\"https:\/\/www3.tusculum.edu\/is\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www3.tusculum.edu\/is\/resources\/it-best-practices\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www3.tusculum.edu\/is\/resources\/it-best-practices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www3.tusculum.edu\/is\/wp-content\/uploads\/2012\/03\/tcdis_feature02-300x263.jpg\",\"datePublished\":\"2021-02-17T20:58:20+00:00\",\"dateModified\":\"2025-04-09T17:45:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www3.tusculum.edu\/is\/resources\/it-best-practices\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www3.tusculum.edu\/is\/resources\/it-best-practices\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www3.tusculum.edu\/is\/resources\/it-best-practices\/#primaryimage\",\"url\":\"https:\/\/www3.tusculum.edu\/is\/wp-content\/uploads\/2012\/03\/tcdis_feature02.jpg\",\"contentUrl\":\"https:\/\/www3.tusculum.edu\/is\/wp-content\/uploads\/2012\/03\/tcdis_feature02.jpg\",\"width\":570,\"height\":500,\"caption\":\"Student using a computer\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www3.tusculum.edu\/is\/resources\/it-best-practices\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www3.tusculum.edu\/is\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"RESOURCES\",\"item\":\"https:\/\/www3.tusculum.edu\/is\/resources\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IT SECURITY BEST PRACTICES\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www3.tusculum.edu\/is\/#website\",\"url\":\"https:\/\/www3.tusculum.edu\/is\/\",\"name\":\"TUDIS\",\"description\":\"Tusculum University Information Systems\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www3.tusculum.edu\/is\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT SECURITY BEST PRACTICES - TUDIS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www3.tusculum.edu\/is\/resources\/it-best-practices\/","og_locale":"en_US","og_type":"article","og_title":"IT SECURITY BEST PRACTICES - TUDIS","og_description":"The following list is provided on the Information Systems website to inform faculty and staff of IT data security best practices. Regularly change your password. Do not share password with others and do not write it on a note near your computer. Save important files to your H: drive. Avoid uploading and saving important files [&hellip;]","og_url":"https:\/\/www3.tusculum.edu\/is\/resources\/it-best-practices\/","og_site_name":"TUDIS","article_modified_time":"2025-04-09T17:45:05+00:00","og_image":[{"url":"https:\/\/www3.tusculum.edu\/is\/wp-content\/uploads\/2012\/03\/tcdis_feature02-300x263.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www3.tusculum.edu\/is\/resources\/it-best-practices\/","url":"https:\/\/www3.tusculum.edu\/is\/resources\/it-best-practices\/","name":"IT SECURITY BEST PRACTICES - TUDIS","isPartOf":{"@id":"https:\/\/www3.tusculum.edu\/is\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www3.tusculum.edu\/is\/resources\/it-best-practices\/#primaryimage"},"image":{"@id":"https:\/\/www3.tusculum.edu\/is\/resources\/it-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/www3.tusculum.edu\/is\/wp-content\/uploads\/2012\/03\/tcdis_feature02-300x263.jpg","datePublished":"2021-02-17T20:58:20+00:00","dateModified":"2025-04-09T17:45:05+00:00","breadcrumb":{"@id":"https:\/\/www3.tusculum.edu\/is\/resources\/it-best-practices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www3.tusculum.edu\/is\/resources\/it-best-practices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www3.tusculum.edu\/is\/resources\/it-best-practices\/#primaryimage","url":"https:\/\/www3.tusculum.edu\/is\/wp-content\/uploads\/2012\/03\/tcdis_feature02.jpg","contentUrl":"https:\/\/www3.tusculum.edu\/is\/wp-content\/uploads\/2012\/03\/tcdis_feature02.jpg","width":570,"height":500,"caption":"Student using a computer"},{"@type":"BreadcrumbList","@id":"https:\/\/www3.tusculum.edu\/is\/resources\/it-best-practices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www3.tusculum.edu\/is\/"},{"@type":"ListItem","position":2,"name":"RESOURCES","item":"https:\/\/www3.tusculum.edu\/is\/resources\/"},{"@type":"ListItem","position":3,"name":"IT SECURITY BEST PRACTICES"}]},{"@type":"WebSite","@id":"https:\/\/www3.tusculum.edu\/is\/#website","url":"https:\/\/www3.tusculum.edu\/is\/","name":"TUDIS","description":"Tusculum University Information Systems","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www3.tusculum.edu\/is\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www3.tusculum.edu\/is\/wp-json\/wp\/v2\/pages\/528","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www3.tusculum.edu\/is\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www3.tusculum.edu\/is\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www3.tusculum.edu\/is\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www3.tusculum.edu\/is\/wp-json\/wp\/v2\/comments?post=528"}],"version-history":[{"count":9,"href":"https:\/\/www3.tusculum.edu\/is\/wp-json\/wp\/v2\/pages\/528\/revisions"}],"predecessor-version":[{"id":573,"href":"https:\/\/www3.tusculum.edu\/is\/wp-json\/wp\/v2\/pages\/528\/revisions\/573"}],"up":[{"embeddable":true,"href":"https:\/\/www3.tusculum.edu\/is\/wp-json\/wp\/v2\/pages\/388"}],"wp:attachment":[{"href":"https:\/\/www3.tusculum.edu\/is\/wp-json\/wp\/v2\/media?parent=528"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}