Reaching Others University at Buffalo - The State University of New York
Skip to Content

Managing Your Computer and Data Safety

Learn how to control your computer's safety by protecting yourself against phishing attempts, removing personal information from your computer and keeping your physical computer or device secure.

Mobile Device Safety

6/19/14

Mobile devices offer a convenient way to access and store information, but smartphones and tablets can also be easily misplaced or stolen, putting personal information and identities at risk.

Web Safety

6/19/14

We recommend changing your browser settings in the University at Buffalo computing environment for added safety precautions.

6/19/14

Over the past several years, security awareness has improved and most people run active software (anti-virus and firewalls) to block incoming attacks. This has led to attackers shifting their tactics; they now try to entice you to invite them in rather than try to directly break in.

6/19/14

Mozilla Firefox offers a more secure Internet browsing experience, with the NoScript extension providing extra protection. Follow our tips and take advantage of tools to stay safe whenever you're online.

6/19/14

Protect your personal information on Facebook, LinkedIn and Google using these helpful links.

Computer Safety

6/19/14

Discover ways to protect your computer and other devices against theft.

Data Safety

6/19/14

Has your account been hacked? Here are some of the most common ways that you can find yourself with a compromised account or stolen information.

6/19/14

One of the most effective ways for you to protect yourself while using the Internet is to make sure your personal equipment is up to date. Fortunately, making sure your personal equipment isn’t vulnerable to hackers isn’t hard to do– there are freely available tools that can take care of it for you.

6/19/14

Antivirus and personal firewall product to protect your personal computer from Internet-based threats.

6/19/14

Keeping Personally Identifiable Information (PII) on your computer is a security risk. Learn the different types of PII that may be located on your computer and download software from UB that can help you remove it.

6/19/14

Find the information you need to protect yourself against phishing attempts. Learn to recognize an attempt and find out what steps you should take if you recieve a phishing attempt or give your personal information to a phisher.

6/19/14

Find out what UB services you can use to clean off your UB-owned or personally owned computer before recycling it.

Did This Page Answer Your Question?

(Required)
 
Email, UBITName or phone number
(Required)
Enter the letters or numbers you see below in the space provided. Click "Get a new challenge" if they are not readable.