Security by Topic Just as you would secure a house by locking the front door and all of your windows and installing a security system, it is critical to take a multi-layered approach to computer security. These are the basic things everyone needs to be aware of in order to better their defense from online dangers. Click here to expand or collapse this section Data Management for Faculty and Staff: This page provides helpful information on secure data retention and disposal, including links to UA Records Management and Archives and UA Surplus Property. Identity Theft: The bottom line for online social threats like phishing, spyware, and hackers is identity theft. ID theft occurs when someone uses your name, Social Security number, credit card number or other personal information without your permission to commit fraud or other crimes. The FTC estimates that as many as 9 million Americans have their identities stolen each year. International Travel: International travel can pose a risk to your sensitive information. Follow the guidelines on this page to mitigate that risk and make your travels more secure and less stressful. Mac Security: Macs and iDevices are wonderful products, but they CAN get infected with malware. Here, we provide helpful tips on keeping your computer and data secure. Mobile Device Security: Mobile devices contain as much personal and private information as computers. As people have become so accustomed to having their mobile devices with them at all times, they tend not to think about the consequences of what could happen to their information if the device is lost, stolen, or hacked. You can increase the security of your mobile devices by taking the same precautions as you do on your computer. NetID+: UA's two-factor authentication. NetID+ greatly enhances the security of your UA NetID by requiring "something you have" with "something you know." Online Security: How can I make sure my computer is protected? Is there a way to "safe" way to surf the internet? This page has helpful tips to reduce risk to your identity and data as you navigate the online world. Password Security: Passwords are the first line of defense against cyber criminals. Your chances of avoiding hacker attacks is dependent on the complexity of your password. Phishing: The most commonly used technique that hackers and identity thieves use to compromise accounts and install malware. As phishing schemes become more sophisticated, with phishers being able to convince up to 5% of recipients to respond, it becomes increasingly important to be vigilant in identifying and protecting yourself from these scams. Secure Social Networking: These sites can be a hacker's playground. Learn how to network online in a secure way. Wireless Security: We live in a wireless world, but it is important to use wireless networks as securely as possible, especially if there is any risk of loss of sensitive or personal data.