Top 10 Security Tips

 

TOP 10 SECURITY TIPS

Logging Out

The urgent necessity to log out of websites and apps depends mostly upon whether or not you are

• Connecting to the internet on a public network, such as a Wi-Fi connection at McDonald’s or the internet at the library, versus a private network, such as a home internet connection; you should always be cautious when accessing the internet through public internet connections.

• Accessing websites and apps that are associated with account management and/or payment methods. Examples include on-line banking, online bill paying, online shopping websites, or any site where you have registered an account and stored personal, sensitive information that you want kept secure. Always log out of your accounts and close the browser, especially when accessing these accounts in public. If you open a window in Incognito mode or Private Browsing, your log-in credentials will not be saved. Also, always be cautious of who’s looking over your shoulder when accessing the internet in public.

• Accessing the internet with a computer or device that only you use, versus one that others may use also. If you’re the only one who’s using the device, then logging out isn’t such an urgent concern. If you’re using your personal device in public, make certain to enable its locking feature.

Logging out is common sense, especially if you’ve accessed sensitive information.

Top 5


Password Protection

http://blog.caspio.com/wp-content/uploads/password-protect-website-applications-big.png

 

 

Don't share your passwords and avoid writing them down.

  • Characteristics of good passwords:
    • A mixture of upper and lower case letters, numbers, and symbols
    • At least 8 characters in length
    • Don't include real words or personal information (i.e. user name, names of family members, places, pets, birthdays, addresses, hobbies, etc.)
    • Easy to remember (so you don't have to write them down)
  • Password protect all of your devices.
  • Use two-factor authentication 

 


Storage of Sensitive Information

http://i.kinja-img.com/gawker-media/image/upload/s--rcPDT4s6--/c_scale,fl_progressive,q_80,w_800/fijx3pjopcew62uiuhhm.jpg

  • Delete sensitive information whenever you can.
  • Don't keep sensitive information and other important files on portable or mobile devices (unless they are properly protected).

 


Scams

http://www.computerandsoftwarehelp.com/wp-content/uploads/2015/08/ComputerSupportScams.jpg

 

  • Don't respond to email, Direct Messages (DMs), texts, phone calls, etc., asking you for your password. You should never disclose your password to anyone, even if they say they work for IT, or other organizations.
  • Malicious links can infect your computer or take you to web pages designed to steal your information. Only click on links from trusted sources.
  • Malicious attachments can infect your computer. Don't open unsolicited or unexpected attachments. If you can't verify an attachment is legitimate, delete it without opening it.
  • Don't give private information to anyone you don't know or who doesn't have a legitimate need for it.

 


Protecting Information on the Web

https://www.eecs.mit.edu/sites/default/files/news/Goldwasser_20120430_1.jpg

 

  • Only use trusted, secure web pages when entering personal or sensitive information online. Don't log in to web sites or online applications unless the login page is secure.
    •  Look for https (not http) in the URL to indicate that there is a secure connection.
  • Be especially careful about what you do over wireless. Information and passwords sent via standard, unencrypted wireless are especially easy for hackers to intercept (most public access wireless).
    • Check your wireless preferences/settings to make sure your devices aren’t set up to auto-connect to any wireless network they detect.
  • Don't send restricted data via email, text, or instant message (IM). These are not generally secure methods of communication.
  • Be extremely careful with file sharing software. File sharing opens your computer to the risk of malicious files and attackers. If you share copyrighted files, you also risk serious legal consequences.

 


Protecting Your Computer: Updates & Security

https://www.nerdsonsite.com/blog/wp-content/uploads/2012/08/Computer-Security-Signpost21.png

  • Shut down or restart your computer at least weekly and whenever your programs tell you to in order to install updates. This helps to make sure software and security updates are properly installed.
  • Make sure you have Anti-Virus Protection on your computer (i.e. Avast, MacAfee, etc.).
    • It is always good to have additional protection on all of your devices (i.e. Malwarebytes, Spybot, Firewalls, etc.).
    • Run computer scans with your anti-virus on a regular basis.

 

Top 6-10


Keep yourself Educated

  • Keep yourself up to date and educated on current events.
  • Be aware of new scamming techniques.
  • Read or receive any training you can.

 


When Leaving your Devices Unattended

  • In your office or dorm room, at coffee shops, meetings, conferences, etc., remember that phones and laptops get stolen all the time.
  • Lock windows and doors, take keys out of drawers and doors, and never share your access code, card, or key.
  • Be sure to lock up portable equipment and sensitive material before you leave an area unattended.
  • Make sure it is locked to or in something permanent.
    • Laptop lockdown cables are available.
  • Lock ALL DEVICES!
    • For a PC (Microsoft Windows) <ctrl><alt><delete> or <Windows><L> 
    • For a Mac go to the Apple menu or power button.
    • On most mobile devices (i.e. phones or tablets) press the power button and have them set to automatically lock (make sure you set a password).

 


Downloading or Installing Programs/Apps

http://appinventor.mit.edu/explore/sites/all/files/SetupAI2/win_unknown_yes.png

  • These can harbor behind-the-scenes viruses or open a "back door" giving others access to your devices without your knowledge.

 


Making Backups

Image result for backuping files

  • Make backup copies of all important files.
    • Make a backup copy at least once a week.
  • There are many sources you can use.
    • External Hard Drives
    • SkyDrive
    • DropBox
    • Google Drive