Key points:
- Important to keep also lab computers secure:
- up to date antivirus
- firewall up and running
- operating system up to date
- passwords
- attention to suspicious emails
- secure important data
- Data backup on multiple sources (i.e. Box) – if the data are sensible proper usage of Box is needed – consult cyber-security office (they can handle data at several different level of confidentiality)
- Risk assessment based on sensibility of the data (sensible data or common open access data?) and complexity of the system controlled.
- If the data and the system (experiments) are high risk systems a plan for proper cyber-security of data and devices must be developed and has to be included as part of the experiment design (campus resources are available to help through the process).
- IoT devices security – instruments connected to the web and remotely controlled is a huge topic moving forward – interesting to consider this while experiments are designed.
Contacts:
for help with Spam, Phishing, other Cyber Incidents: abuse@wisc.edu.
for consulting about IT and cyber-security issues in research:
for high level questions – discussions: Bob Turner – Chief Information Security Officer.
RESOURCES:
- Checklist for personal computers: 03091703
- UW Madison’s Risk Management Framework 03091704
- Incident severity and information sharing color codes 03091706
- University of Wisconsin-Madison Cybersecurity-at-a-Glance 03091707