Updating...
Skip to main content
Filter your search by category. Current category:
All
All
Knowledge Base
Service Catalog
Search the client portal
Search
Sign In
Show Applications Menu
TechConnect
Sign In
Search
Home
Services
Knowledge Base
More Applications
Skip to Knowledge Base content
Search
Articles
Blank
Knowledge Base
Cybersecurity and Safe Computing
Securing and Protecting Your Devices
Securing and Protecting Your Devices
Tags
cybersecurity
secure
protect
Secure Your Device
Create a PIN or passcode for your smartphone.
Protect your laptop or off-campus workstation with a password only you know.
Never share your passwords with anyone else.
Stolen/Lost Devices
If your UTHSC-owned device has been lost or stolen, please contact UTHSC Campus Police at
utpolice@uthsc.edu
or 901.448.4444. If that device had classified patient or student information, contact UTHSC
Office of Cybersecurity
at
itsecurity@uthsc.edu
.
Symptoms of a Problem
The device is running slow
Pop-ups
Unfamiliar or peculiar error messages
Desktop background or browser home page changes unexpectedly
Missing files
Keep Up-to-Date
Download operating system security patches and updates.
Use the latest version of the software.
Stay with reputable websites and mobile applications (apps). Only download trusted applications from an official app store.
Have a Plan
If your device is lost/stolen: Find my iPhone, Locate My Device, AirDroid, and other native location pinpointing applications can help you find your device if lost. Please contact your provider and ask them to recommend you a TRUSTED locater application.
Smartphones
Create a PIN or passcode for your device.
Keep apps updated and only download from reputable sources.
Use an app such as Find My iPhone to help locate your phone if it is lost.
Screen Lock
When you leave your desk, use a password-protected screen saver so your computer cannot be accessed by others.
The quickest way to lock your screen is keyboard shortcuts:
Windows - Windows key + L
MACs - Ctrl+Cmd+Q
Backups
Regularly back up your important data and keep backups of important information in a different secure location.
Sign in to leave feedback
0 reviews
Blank
Blank
Blank
Blank
Print Article
Deleting...
×
Share
Recipient(s)
- separate email addresses with a comma
Message
Press Alt + 0 within the editor to access accessibility instructions, or press Alt + F10 to access the menu.
Check out this article I found in the TechConnect knowledge base.<br /><br /><a href="https://uthsc.teamdynamix.com/TDClient/2280/Portal/KB/ArticleDet?ID=138512">https://uthsc.teamdynamix.com/TDClient/2280/Portal/KB/ArticleDet?ID=138512</a><br /><br />Securing and Protecting Your Devices<br /><br />These best practices about security and protecting devices will help protect the data on them.