Cybersecurity for Researchers
🔬 Cybersecurity for Researchers
Protecting research data is critical to Caltech's mission. As a world-renowned research institution, Caltech's laboratories, faculty, and students are prime targets for cyber threats due to the high value of their intellectual property, sensitive data, and collaborations with government and industry.
A single compromised account or system can lead to:
- 📉 Loss of research data
- ⚠️ Regulatory non-compliance (e.g., NIST 800-171, CMMC, ITAR)
- 🔍 Intellectual property theft
- 📰 Reputational damage to researchers and the Institute
- 💸 Financial loss due to incident response and recovery
🧪 What Researchers Should Do
🔐 Secure Your Credentials
Use strong, unique passwords and enable Multi-Factor Authentication (MFA) on all research-related accounts, including cloud platforms, lab systems, and collaboration tools.
🧬 Protect Research Data
Classify your data based on sensitivity and apply appropriate protections. Use encrypted storage and secure file transfer methods. Avoid storing sensitive data on personal or unapproved devices.
🧰 Use Approved Tools and Platforms
Only use Caltech-approved software and cloud services for storing, analyzing, or sharing research data. Avoid free or unvetted tools that may not meet security or compliance standards.
🧑🔬 Collaborate Securely
When working with external collaborators, ensure secure data sharing practices are in place. Use institutional accounts and secure portals rather than personal email or consumer-grade platforms.
🧯 Prepare for Incidents
Know how to report a suspected breach or phishing attempt. Participate in tabletop exercises and review your lab's incident response plan regularly.
📚 Stay Informed
Cyber threats evolve constantly. Stay current with Caltech's cybersecurity alerts, attend training sessions, and review updated guidance for research security.
📘 Additional Resources
Access tailored guidance and best practices for securing your research:
👉 Research Security Recommendations