Computer Security


             Ten Ways to Secure your Computer 

1. Always make backups of important information and store in a safe place separate from your computer.

2.Do not run programs from unknown origins. Also, do not send these types of programs to friends and coworkers because they contain funny or amusing stories or jokes. They may contain a Trojans horse waiting to infect a computer.

3. Control CD Burners and External Media - CD/DVD Burners, Flash drives and cell phones make data incredibly portable. So portable that critical company data could walk right out the front door snuggly tucked away on the flash drive of a temp, or in the iPod of an unhappy employee. Just like the Internet, if they don't need it to do their jobs, don't give it to them.

4. Persistent security - Don’t fall into the trap of meticulously securing your running systems, then getting compromised or having sensitive data recovered because you didn’t put any thought into securing the systems slated for disposal. The need for good security practice doesn’t go away when you turn off the computer.

5. Windows File Permissions - The Windows operating system has got permission settings built into it to limit or grant access to people or groups. For example, if you have a folder with files you only want you and your accountant to access, but not Becky the Admin Assistant. Or, perhaps you have performance reviews to which only you should be privy, you can set that up as well.

6. Know your server - Your server is very essential as you basically keep all of your files there, and it will cause your website to run smoothly. Intruders, on the other hand, can add virus or malware into your system, thereby causing damage into your website. If you are running it on your own, you must know your server properly. This way, you can set the right security and permission level for your site.

7. Limit Employee Computer Use - If your employees have unfettered web access from their computers, you're probably inviting trouble if they don't need web access to perform their job duties. Appliances like Untangle can easily block, limit or monitor web activity by each user. For a cheap alternative, check my blog my post from back in January about a free and effective web blocking tool built right into Internet Explorer called Content Advisor.

8. Be Vigilant - Even if the email is from someone you know, if you are not expecting an attachment, don't open it. If the email includes a web link, are you sure you need to click it? If a sales guy shows up and wants to show you files he has on his flash drive, politely decline.

 9. Do not open unknown email attachments. It is simply not enough that you may recognize the address from which it originates because many viruses can spread from a familiar address.

10. Disable hidden file name extensions - By default, the Windows operating system is set to “hide file extensions for known file types”. Disable this option so that file extensions display in Windows. Some file extensions will, by default, continue to remain hidden, but you are more likely to see any unusual file extensions that do not belong.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS