The best time to secure information in your project is before you even collect it. Use this guide to think through how your project will handle data at each stage, from creation to deletion.
Plan
This is where you are now. As you scope your project, here are things to consider.
Define a Data Owner: Who is ultimately responsible for the stewardship of this data? If it isn’t you, make sure they are involved in this planning stages of this project.
Hacking isn’t magic, it’s persistence. Hackers and cyber criminals take advantage of simple mistakes and misconfigurations to access your money, files, and messages. Sophisticated attacks take more time and expose tricks that attackers prefer to keep secret. This means the more basics you do well, the more likely an attacker will simply move on to the next target. In this guide we will cover:
There are several ways to make working-from-home work for you. Review this guide to discover the available options.
Before you do work for Harvard on your personal network, confirm your home wi-fi has a strong unique password. Do not use default passwords from your internet provider or router manufacturer.
Preferred Option: Use your Harvard Laptop
If you have a Harvard issued laptop, your best option for working remotely is to bring your Harvard laptop home. All your custom applications and settings will be...
University business conducted using University tools is in compliance with University regulations and policy, and is protected by contractual and other security measures not available to consumer tools.
The following services provide encryption of attached files sent to specified recipients. Remember, the body of message that accompanies the file is not encrypted, so don't put sensitive information into the message itself.
Secure File Transfer for the following Schools is available at the links below.