110 likes | 116 Views
Learn vital behavioral actions and computer-based strategies to safeguard your personal information. This guide includes tips on credit card protection, secure online behavior, using encryption, and wireless security practices.
E N D
TECHNOLOGY GUIDE FIVE Protecting Your Information Assets
Behavioral Actions • Do not provide personal information to strangers in any format • Protect your social security number • Credit Cards • Use credit cards with your picture on them • Use virtual credit cards • Know your credit card billing cycles • Limit use of debit cards
Behavioral Actions (continued) • Do not use a personal mailbox at home or at an apartment • Use a cross-cut (confetti) shredder • Sign up with a company that provides proactive protection of your personal information
Computer-Based Actions • Never open unrequested attachments to e-mail files, even those from people you know and trust. • Never open attachments or Web links in e-mails from people you do not know. • Never accept files transferred to you during Internet chat or instant messaging sessions. • Never download any files or software over the Internet from Web site that you do not know.
Computer-Based Actions (continued) • Never download files or software that you have not requested. • Test your system. • Run free malware scans on your computer. • Have an anti-malware product on your computer and use it (ideally at least once per week). • Have a firewall on your computer.
Computer-Based Actions (continued) • antispyware product on your computer. • rootkit detection product on your computer. • monitoring software on your computer. • content filtering software on your computer. • antispam software on your computer.
Computer-Based Actions (continued) • Have proactive intrusion detection and prevention software on your computer. • Manage patches. • Use a browser other than Internet Explorer. • Travel with a “sterile” laptop or no laptop. • Use two-factor authentication. • Use encryption.
Computer-Based Actions (continued) • User laptop tracing tools or device reset/remote kill tools. • Turn off peer-to-peer (P2P) file sharing. • Look for new and unusual files. • Detect fake web sites. • Use strong passwords.
Computer-Based Actions (continued) • Adjust privacy settings on your computer. • Surf the Web anonymously. • E-mail anonymously. • Erase your Google search history. • Personal disaster preparation: backup, backup, backup! • Carbonite
Wireless Security • Hide your Service Set Identifier (SSID) • Use encryption. • Filter out media access control (MAC) addresses • Limit Internet Protocol (IP) addresses. • Sniff out intruders. • Change the default administrator password on your wireless router to something not easily guessed
Wireless Security (continued) • Use virtual private networking (VPN) technology to connect to your organization’s network. • Use Remote Desktop to connect to a computer that is running at your home. • Configure windows firewall to be “on with no exceptions.” • Only use Web sites that use Secure Sockets Layer (SSL) for any financial or personal transactions Use wireless security programs.