- Think Security
- Whenever using mobile data, always keep in mind the question:"What could happen if an unauthorized person gained control of this information?". Look for and try to use the most secure methods for handling data.
- Don't be a target
- Turn your system off when it is not in use. Your machine will be less of a target for break-in attempts, and less valuable as a 'robot' machine in a cracker's collection of compromised hosts.
- Get training; understand your equipment
- Read the instructions. New electronic devices have more features, which means that you will have more of a “learning curve” to be able to understand and use these items properly. Default settings are often the least secure for devices, and everyone who has the same device will have the same default settings. Read the manuals that come with your items and be sure you understand the settings and how to change the default settings, especially anything related to security.
- Don't knowingly expose yourself to security threats
- WTS strongly recommends you do not install Peer-to-Peer (P2P) file sharing software on your computers. Some Examples of P2P software are: LimeWire, Ares, Azureus, BearShare, BitTorrent, DC ++, eDonkey, E-mule, Gnutella, Kazaa, Morpheus, and WinMX. P2P technology can undermine network security and can leave computing devices open to threats ranging from violations of intellectual property laws (copyright), viruses, malware (malicious software) that is undetected by antivirus protection, password and data theft, to Denial of Service (DoS) attacks that flood the network with data and incapacitate computers. Many P2P programs install Trojans, backdoors and other privacy compromising software onto systems they are installed on. Besides the obvious copyright violations that can occur with audio/video sharing, you may be sharing personal information such as your e-mail password or bank account PIN number.
These recommendations help ensure a safe home computing environment and should be followed by all individuals who access the University network.
At a basic level, this means strong passwords, antivirus and antispyware software, consistent security updates, a firewalled router with Wi-Fi Protected Access (WPA) enabled, if it is wireless, encryption and backup.
Linux, Windows and Apple typically provide distributions that you can use without modification for most purposes; however, sometimes it's necessary to upgrade. The most effective way to mitigate a worm and its variants is to download security updates and patch all vulnerable systems.
- Alerts and Tips
- Security Focus
- Computer Vulnerabilities and Exposures
- Internet Storm Center
- Trendmicro Awareness and Prevention
- Microsoft Safety and Security Center
Published on and maintained in Cascade CMS.