If you have not followed some of these
tips before, this information can function as a security checklist. For
instructions on how to implement these steps, follow the "learn more"
links.
Top 10 safe computing tips
1. Patch, Patch,
PATCH!
Set up your computer for automatic software and operating system updates. An unpatched machine is more likely to have software vulnerabilities that can be exploited.
Set up your computer for automatic software and operating system updates. An unpatched machine is more likely to have software vulnerabilities that can be exploited.
2. Install
protective software.
Sophos is available as a free download for Windows, Macintosh, and Linux from IS&T's software page. When installed, the software should be set to scan your files and update your virus definitions on a regular basis.
Sophos is available as a free download for Windows, Macintosh, and Linux from IS&T's software page. When installed, the software should be set to scan your files and update your virus definitions on a regular basis.
3. Choose strong
passwords.
Choose strong passwords with letters, numbers, and special characters to create a mental image or an acronym that is easy for you to remember. Create a different password for each important account, and change passwords regularly.
Choose strong passwords with letters, numbers, and special characters to create a mental image or an acronym that is easy for you to remember. Create a different password for each important account, and change passwords regularly.
4. Backup, Backup,
BACKUP!
Backing up your machine regularly can protect you from the unexpected. Keep a few months' worth of backups and make sure the files can be retrieved if needed. Learn more about TSM and how to backup your system.
Backing up your machine regularly can protect you from the unexpected. Keep a few months' worth of backups and make sure the files can be retrieved if needed. Learn more about TSM and how to backup your system.
5. Control access
to your machine.
Don't leave your computer in an unsecured area, or unattended and logged on, especially in public places - including Athena clusters and Quickstations. The physical security of your machine is just as important as its technical security.
Don't leave your computer in an unsecured area, or unattended and logged on, especially in public places - including Athena clusters and Quickstations. The physical security of your machine is just as important as its technical security.
6. Use email and
the Internet safely.
Ignore unsolicited emails, and be wary of attachments, links and forms in emails that come from people you don't know, or which seem "phishy." Avoid untrustworthy (often free) downloads from freeware or shareware sites. Learn more about spam filtering.
Ignore unsolicited emails, and be wary of attachments, links and forms in emails that come from people you don't know, or which seem "phishy." Avoid untrustworthy (often free) downloads from freeware or shareware sites. Learn more about spam filtering.
7. Use secure
connections.
When connected to the Internet, your data can be vulnerable while in transit. Use remote connectivity and secure file transfer options when off campus.
When connected to the Internet, your data can be vulnerable while in transit. Use remote connectivity and secure file transfer options when off campus.
8. Protect
sensitive data.
Reduce the risk of identity theft. Securely remove sensitive data files from your hard drive, which is also recommended when recycling or repurposing your computer. Use the encryption tools built into your operating system to protect sensitive files you need to retain.
Reduce the risk of identity theft. Securely remove sensitive data files from your hard drive, which is also recommended when recycling or repurposing your computer. Use the encryption tools built into your operating system to protect sensitive files you need to retain.
9. Use desktop
firewalls.
Macintosh and Windows computers have basic desktop firewalls as part of their operating systems. When set up properly, these firewalls protect your computer files from being scanned.
Macintosh and Windows computers have basic desktop firewalls as part of their operating systems. When set up properly, these firewalls protect your computer files from being scanned.
10.
Most
importantly, stay informed.
Stay current with the latest developments for Windows, Macintosh Linux, and Unix systems. IS&T provides a news page and we recommend that those interested subscribe to the IS&T Security-FYI electronic newsletter.
Stay current with the latest developments for Windows, Macintosh Linux, and Unix systems. IS&T provides a news page and we recommend that those interested subscribe to the IS&T Security-FYI electronic newsletter.
Protecting a computer vs. safe computing behavior
You
can see from the list above that safe computing practices include a combination
of how you physically or technically protect your computer by using software
and security settings, and the actions you take. You need both to really make a
difference. If you consistently use strong passwords, but then leave your
computer unlocked and unattended in public places, you are still putting your
data in jeopardy. If you use anti-virus software but aren't careful about
replying to or forwarding suspicious looking emails, you still risk spreading a
virus.
No comments:
Post a Comment