Loyola University Chicago

University Information Security Office

Information Technology Services

Protect Yourself

There are a number of simple, proactive steps that you can take to make your computer much harder to break into. These steps are listed below.

  1. Patches and Updates
    • Critical patches and updates mitigate security holes in operating systems and applications. University owned computers have updates to the operating system and large applications managed; there is nothing you need to do. However, you should check for updates on personal devices and for applications that are not installed by default.
  2. Strong Passwords
    • In recent years, passwords have become less and less effective. With the advance in technology, the business of cracking encrypted passwords has become much easier. Still, it is important to use strong passwords to protect your accounts.
  3. Phishing
    • Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details by posing as a trustworthy entity in an electronic communication. The most common means of phishing is through email with a link to an online form that prompts for your information.
  4. Antivirus
    • Antivirus is used to prevent, detect and remove malicious computer viruses, malware, and trojans. Every computer should run up-to-date antivirus to protect it and prevent these malicious programs from spreading.
  5. Personal Firewall
    • A personal firewall is a software network security system that controls incoming and outgoing network traffic by analyzing the data and determining whether it should be allowed or not. These programs protect your computer from unwanted, external access and stop malicious programs communicating with the internet.

If you have other questions, please e-mail DataSecurity@luc.edu.