computer security best practices. secure your stuff! physically secure your workstation by locking...

6
COMPUTER SECURITY BEST PRACTICES

Upload: donna-barnett

Post on 01-Jan-2016

220 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: COMPUTER SECURITY BEST PRACTICES. SECURE YOUR STUFF!  Physically secure your workstation by locking your screen when away  Secure any small, easy to

COMPUTER SECURITY

BEST PRACTICES

Page 2: COMPUTER SECURITY BEST PRACTICES. SECURE YOUR STUFF!  Physically secure your workstation by locking your screen when away  Secure any small, easy to

SECURE YOUR STUFF! Physically secure your workstation by

locking your screen when away Secure any small, easy to transport

items when you are away from the office (laptops, ipads, portable drives)

Lock doors when necessary and pay attention to unfamiliar personnel

Don’t give out sensitive or confidential information via phone or in person

Page 3: COMPUTER SECURITY BEST PRACTICES. SECURE YOUR STUFF!  Physically secure your workstation by locking your screen when away  Secure any small, easy to

ANTIVIRUS Have an anti-virus or combo

anti-virus/anti-malware program installed

Make sure you aren’t running a “trial” or “demo” version that has expired

Check the settings to be sure updates and routine scans are scheduled

Don’t ignore warnings or alerts

Page 4: COMPUTER SECURITY BEST PRACTICES. SECURE YOUR STUFF!  Physically secure your workstation by locking your screen when away  Secure any small, easy to

KEEP UP TO DATE Apply updates for security vulnerabilities This includes your Operating Systems

(Microsoft Windows/ Mac OS/ Linux, etc.) Also includes updates specific to any

applications you may use (Adobe Products, Mozilla Firefox, Internet Explorer, etc.)

If these are scheduled to run automatically, periodically check to be sure they are completing successfully

Page 5: COMPUTER SECURITY BEST PRACTICES. SECURE YOUR STUFF!  Physically secure your workstation by locking your screen when away  Secure any small, easy to

SAFE SURFING

Be very cautious concerning which sites you surf on internet

Block pop-ups if at all possible Be very cautious with links, games and apps

via Social Networking (Facebook, Twitter, etc.) Don’t respond to emails or phone calls

requesting sensitive/confidential/personal information. This could also be via email requests or by clicking a link in an email –even from someone you know

Page 6: COMPUTER SECURITY BEST PRACTICES. SECURE YOUR STUFF!  Physically secure your workstation by locking your screen when away  Secure any small, easy to

USE AND STORAGE OF SENSITIVE INFORMATION

Understand what this means (Sensitive) Re-evaluate the way you work (Is there a better way

to accomplish your task – with no need for sensitive information to be collected, stored or accessed?)

If you have a Business need or other requirement (State/Federal Laws, Grants) to work with this type of information, understand the requirements for safely accessing, storing, and archiving

Check with your tech support to implement requirements