60 likes | 160 Views
COMPUTER SECURITY. BEST PRACTICES. SECURE YOUR STUFF!. Physically secure your workstation by locking your screen when away Secure any small, easy to transport items when you are away from the office (laptops, ipads , portable drives)
E N D
COMPUTER SECURITY BEST PRACTICES
SECURE YOUR STUFF! • Physically secure your workstation by locking your screen when away • Secure any small, easy to transport items when you are away from the office (laptops, ipads, portable drives) • Lock doors when necessary and pay attention to unfamiliar personnel • Don’t give out sensitive or confidential information via phone or in person
ANTIVIRUS • Have an anti-virus or combo anti-virus/anti-malware program installed • Make sure you aren’t running a “trial” or “demo” version that has expired • Check the settings to be sure updates and routine scans are scheduled • Don’t ignore warnings or alerts
KEEP UP TO DATE • Apply updates for security vulnerabilities • This includes your Operating Systems (Microsoft Windows/ Mac OS/ Linux, etc.) • Also includes updates specific to any applications you may use (Adobe Products, Mozilla Firefox, Internet Explorer, etc.) • If these are scheduled to run automatically, periodically check to be sure they are completing successfully
SAFE SURFING • Be very cautious concerning which sites you surf on internet • Block pop-ups if at all possible • Be very cautious with links, games and apps via Social Networking (Facebook, Twitter, etc.) • Don’t respond to emails or phone calls requesting sensitive/confidential/personal information. This could also be via email requests or by clicking a link in an email –even from someone you know
USE AND STORAGE OF SENSITIVE INFORMATION • Understand what this means (Sensitive) • Re-evaluate the way you work (Is there a better way to accomplish your task – with no need for sensitive information to be collected, stored or accessed?) • If you have a Business need or other requirement (State/Federal Laws, Grants) to work with this type of information, understand the requirements for safely accessing, storing, and archiving • Check with your tech support to implement requirements