1 / 12

Computer and Physical Security Recommendations

Computer and Physical Security Recommendations. Assure that computers and work locations are secured when work areas are not staffed. Log-off or lock your PC’s screen when you leave the immediate work area… Meetings, Breaks, Lunches, End-of-the-day…

Angelica
Télécharger la présentation

Computer and Physical Security Recommendations

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer and Physical Security Recommendations

  2. Assure that computers and work locations are secured when work areas are not staffed. • Log-off or lock your PC’s screen when you leave the immediate work area… • Meetings, Breaks, Lunches, End-of-the-day… • Shut Down PCs at the Close of Business each day… • Assure that work areas are kept locked…

  3. Don’t allow NON-STAFF persons to use STAFF PCs or workstations • Student Casual Workers • Children or Family members • Visitors • Friends • Unknown persons ???

  4. Know who is accessing the STAFF PCs around you. • Question anyone who comes in to FIX, UPGRADE, REPAIR or REMOVE any computer equipment. • If you are un-sure if the Repair Person is Genuine • STOP THEM… • Call the ITS Help Desk to verify their identity • Locate Online Photos of ITS Technical Staff at the ITS: Tech Services Web Page • Report any un-authorized access immediately to your Supervisor or Dean and the ITS: Help Desk… • As a last resort if you are unable to verify the identity of any repair person immediately - Call Campus Police …

  5. Beware of what files you store on your PC. • NO - Confidential information • NO - Disciplinary information • NO - Personal <or> Private information • NO - Unauthorized Software

  6. Safely Store Back-up CDs or Data Diskettes away from harm… • Use a Sturdy diskette storage box • Lock the Storage Box in a Secure Storage Location <or> Locked File Cabinet • Never store diskettes or CDs out in the open…

  7. Dispose of Diskettes CDs or Backup tapes correctly. • Re-format <or> Destroy all data diskettes or CDs before throwing them away… • Break the diskette cover and remove the disk • Cut up the disk or CD with scissors to assure destruction • Safely throw away all parts

  8. Safeguard any Original Software CDs, Manuals or Licenses • Store in a Locked Secure Location • Record any License Numbers • Don’t loan out software to others…

  9. Maintain the Antivirus Software for your PCs • Assure Antivirus Software is loaded and operating on your PC • Setup the Antivirus Software to automatically update the scanning data files - Daily • Check the Antivirus Program and Data Files – Weekly • Scan your Computer for Viruses – Twice a week • Updates for the McAfee Software is available on the ITS: Tech Services Web Page http://www.elcamino.edu/administration/techservices

  10. ITS: Technical Services Web Pages • Online Work Orders for Computer and Audio Visual Repairs • Antivirus Software Updates • ITS: Technical Staff Pages • Names, Photos, Email Addresses, Phone Numbers… • Computer and Printer Hardware Recommendations • Access to Software and Hardware Vendor Web Pages http://www.elcamino.edu/administration/techservices

More Related