In this world, there has thousands of security solutions that are available, but why is protecting sensitive data so difficult? A dizzying variety of technical solutions are available, like network firewalls, personal firewalls, operating system patching solution, anti-virus, anti-spyware, intrusion-detection , and security management systems. Shouldn’t we able to keep our most sensitive data safe? The answer to this question will be yes!
The following is a list of things that I believe every computer user should know :
1. Identity and remove those unnecessary files which contain Social Security numbers, credit card numbers, or other such information if no longer required.
2. Set passwords on all accounts.
3. Keep software and operating system up-to-date.
4. Approach e-mail attachments with care. Before opening any attachment, the recipient should consider whether the sender is known and if the attachment is expected, if no, then recipient should not open such attachment.
5. Run anti-virus software. Since so much business is performed using e-mail, this is a compulsory application to help identify viruses.
6. Limit access to the computer. Turn file-sharing off unless absolutely
Necessary, if file- sharing is necessary, configure it with a strong password.
7. Run a personal firewall. Both Microsoft Windows and Apple Mac OS have buit-inpersonal firewalls that should not be turned off. Consider other commercially available firewalls as an additional step.
8. Turn off the computer when it is not in use. Unless the computer must be kept running for services. It is impossible to compromise or infect a computer that is not running.
9. Regularly check for spyware. Spyware is often is installed in computers when other applications are installed or when Wes sites are visited.
1. Identity and remove those unnecessary files which contain Social Security numbers, credit card numbers, or other such information if no longer required.
2. Set passwords on all accounts.
3. Keep software and operating system up-to-date.
4. Approach e-mail attachments with care. Before opening any attachment, the recipient should consider whether the sender is known and if the attachment is expected, if no, then recipient should not open such attachment.
5. Run anti-virus software. Since so much business is performed using e-mail, this is a compulsory application to help identify viruses.
6. Limit access to the computer. Turn file-sharing off unless absolutely
Necessary, if file- sharing is necessary, configure it with a strong password.
7. Run a personal firewall. Both Microsoft Windows and Apple Mac OS have buit-inpersonal firewalls that should not be turned off. Consider other commercially available firewalls as an additional step.
8. Turn off the computer when it is not in use. Unless the computer must be kept running for services. It is impossible to compromise or infect a computer that is not running.
9. Regularly check for spyware. Spyware is often is installed in computers when other applications are installed or when Wes sites are visited.
This entry was posted
on Thursday, June 19, 2008
at 3:20 AM
and is filed under
week 4
. You can follow any responses to this entry through the
comments feed
.