Computer Security Tips for Home, School, and Work
- Protect your passwords
- Lockup your computer
- Install and maintain operating system patches
- Install and maintain anti-virus programs
- Install and use a firewall program
- Make backups of important files and folders
- Safeguard you e-mails
- Use care when downloading and installing programs
- Encrypt your data on your desktop or laptop
- Completely remove file and print sharing
1. Protect your passwords
Select a strong, secure password and don’t write it down. Never share your passwords with your colleague or friends. You are accountable for all transactions and other changes made to system resources, including data. If you share your passwords, you may be giving an unauthorized individual access to a system and may be held responsible for their actions.
For information on how to select a good password, see Password Guidelines.
2. Lockup the Desktop
Lock your computer to help prevent unauthorized persons from using your computer while you are away from it.
To set a password-protected screensaver on Windows:
- Right click on a blank part of the Windows Desktop area
- Choose “Properties” then “Screensaver” Tab
- Select a screensaver (from the drop down list)
- Select how many minutes of inactivity before the screen saver turns on
- Click on “On Resume, Password Protect”
You will be required to enter your Windows password before using your computer again.
To lock your Windows computer manually:
This option will lock the keyboard and blank the monitor screen until a valid password is entered.
- Hold the “Flying Window” key & “L” Key OR
- “Ctrl” “Alt” “Del”
3. Install and maintain operating system patches
Along with weak passwords and virus-spreading e-mail attachments, are computer systems that are not patched constitute one of the leading security threats on the Internet.
The University regularly deploys and installs Microsoft patches to University computers. For home use, patches can be installed by going to the Microsoft Windows Update site at http://windowsupdate.microsoft.com.
4. Install and update anti-virus software
All computers should run an anti-virus program to prevent unwanted virus, programs installed on your computer. Once installed, be sure to update it on regular basis.
It is the University of St. Thomas’ policy that all computers connected to the University network be required to have working anti-virus software installed and that the anti-virus software to be kept up-to-date. Currently, The University of St. Thomas has specified anti-virus software by McAfee to be used for all University computers connected to the University network.
5. Install and Use Firewall Programs
Install and turn on your firewall program. Firewall software provides a protective barrier between your computer and potentially harmful content on the Internet. It can monitor communications to and from your computer, and allow you, the user, to permit or deny inbound and outbound traffic (e.g., connection requests). Firewalls can block/notify the user for intrusion attempts, but they cannot protect against malware, so make sure you have some type of antivirus software installed on your computer and that you keep it up-to-date. Also be sure to install and configure your firewall correctly, otherwise it will not work properly.
6. Make Data Backup of Important Files and Folders
It is important for users to regularly perform data backups. Backed up data will relieve the stress and frustration of data loss. Data Backups will enable the recovery of data lost or corrupted due to user error, power failures, theft, hardware faults, or malware. Data backup can be used by anyone and for anything the user cannot or does not want to recreate.
A couple of effective back up routines would be the following:
- Back up important information to at least two different forms of media (e.g. thumb drive/USB stick, CDs/DVDs)
- Store the backup data in a separate, secure locations
7. Safeguard on E-mails and Instant Messenger
E-mails and Instant Messenger are valuable tools but they can be used or misused in a variety of ways. Data sent through either one is not considered confidential or secure. Therefore, do not send confidential or sensitive information, like social security number s or account numbers through unencrypted e-mail or instant messenger. Do not open a message or an attachment from an unknown sender.
8. Use care when downloading & installing programs
Download software or files only from trusted sources. Do not download applications from peer-to-peer files sharing. You may believe that you are downloading freeware or an evaluation version of commercial software but you are actually installing malware on your computer.
9. Encrypt your data on your desktop or laptop
Whether someone has managed to log into your desktop or laptop, you can have the data encrypted which cannot be accessed.
10. Completely remove File and Print Sharing
By default, your Windows XP workstation is configured to act like a File and Print Server. This means, other people can connect to your computer and access the files that are stored on it. They can view the files, and if they want, delete the files. Most networked printers are connected directly to the network, and therefore most people do not need Microsoft Printer Sharing.
To remove File and Print Sharing from your computer:
- Go into the Control Panel (Click the Windows Start button and choose Settings, then Control Panel)
- Double click Network Connections (sometimes labeled Network and Internet Connections)
- Highlight any network connection (Typically there is one labeled “Local Area Connection”)
- Choose Properties from either the File menu or from the menu presented when you right-click on the connection
- Highlight “File and Print Sharing”
- Click “Uninstall”
- Click OK a couple of times, and your computer is significantly safer from network-based intrusions
For information regarding file and print sharing please visit Microsoft at http://www.microsoft.com/windowsxp/using/
11. Shutdown your computer when not in use
This practice is listed for the obvious reason that a computer that is turned off cannot be electronically compromised. If a computer is not required to run overnight or over the weekend, it should be shutdown and power off. Not only will this alleviate the danger of a criminal breaking into the system electronically, it will save power.