1 / 6

COMPUTER SECURITY

COMPUTER SECURITY. BEST PRACTICES. SECURE YOUR STUFF!. Physically secure your workstation by locking your screen when away Secure any small, easy to transport items when you are away from the office (laptops, ipads , portable drives)

tyrone
Télécharger la présentation

COMPUTER SECURITY

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. COMPUTER SECURITY BEST PRACTICES

  2. SECURE YOUR STUFF! • Physically secure your workstation by locking your screen when away • Secure any small, easy to transport items when you are away from the office (laptops, ipads, portable drives) • Lock doors when necessary and pay attention to unfamiliar personnel • Don’t give out sensitive or confidential information via phone or in person

  3. ANTIVIRUS • Have an anti-virus or combo anti-virus/anti-malware program installed • Make sure you aren’t running a “trial” or “demo” version that has expired • Check the settings to be sure updates and routine scans are scheduled • Don’t ignore warnings or alerts

  4. KEEP UP TO DATE • Apply updates for security vulnerabilities • This includes your Operating Systems (Microsoft Windows/ Mac OS/ Linux, etc.) • Also includes updates specific to any applications you may use (Adobe Products, Mozilla Firefox, Internet Explorer, etc.) • If these are scheduled to run automatically, periodically check to be sure they are completing successfully

  5. SAFE SURFING • Be very cautious concerning which sites you surf on internet • Block pop-ups if at all possible • Be very cautious with links, games and apps via Social Networking (Facebook, Twitter, etc.) • Don’t respond to emails or phone calls requesting sensitive/confidential/personal information. This could also be via email requests or by clicking a link in an email –even from someone you know

  6. USE AND STORAGE OF SENSITIVE INFORMATION • Understand what this means (Sensitive) • Re-evaluate the way you work (Is there a better way to accomplish your task – with no need for sensitive information to be collected, stored or accessed?) • If you have a Business need or other requirement (State/Federal Laws, Grants) to work with this type of information, understand the requirements for safely accessing, storing, and archiving • Check with your tech support to implement requirements

More Related