Information Security Tips
Information Security Checklist
1. Password protect and track your mobile device(s).
Mobile devices can be easily lost or stolen. Always protect them with a password or PIN (6 digits or better). Also, configure your device to enable remote location and wiping in case it is lost or stolen:
2. Create strong passwords that are unique for each service with a password manager.
Passwords are easily guessed and/or cracked with today’s computing power, or known as a result of the numerous account breaches. Don’t use the same password for multiple accounts. A password manager will help keep passwords and accounts in sync.
Consider using a password manager to generate complex passwords.
Also - enable two factor authentication.
Information Technology will never ask for your password!
3. Don’t reply to phishing emails requesting your account, username, password, or other sensitive information.
Phishing, or spear phishing, emails look legitimate and ask for your username and password under the guise of a perceived, sometimes urgent, need.
NEW training tool can test your ability to spot a phish!
4. Don’t blindly accept invitations in your social networks (Facebook, Twitter, LinkedIn, etc), don’t open attachments or installers from others, and don’t click on links in emails from unknown senders.
Unless you are explicitly downloaded the file or software for installation, never open it.
If you are unsure, call the sender to confirm they sent you something. Instead of clicking one the URL in the email message, copy and paste it into a web browser or visit it by manually typing in the address.
5. Update everything and install security software:
Windows and Mac OS updates - Schedule and install operating system updates and security patches.
Anti-virus/Anti-malware - Run updates and schedule scans on your computer for commercial products.
Visit the Microsoft Security Center - Download Security Essentials and check for malware with Microsoft’s Safety Scanner
Web browser plug-ins - Update helper applications, such as Adobe Acrobat Reader, Flash and Oracle’s Java
Visit Qualys, a trusted security leader, and use their free browser check tool.
Visit Mozilla, makers of Thunderbird and Firefox, and check your Firefox browser plug-ins.
Below are links to Oracle’s web pages for uninstalling or disabling Java on your computer:
6. Stop illegal file-sharing and remove your peer-to-peer (P2P).
It is against the law to share or distribute copyrighted material. Learn how L&C responds to copyright infringement claims.
7. Set privacy for social networking sites.
Learn how to set the privacy settings so they are as restrictive as possible and protect your reputation. Also be careful what you post/publish on your social networking sites.
8. Stay away from untrusted networks or public computers.
Be careful when using free, public wireless networks at hotels, airports, and coffee shops or public computers. Refrain from doing any sensitive online activities or using any account information and always ensure you log off of public computers.
9. Turn off your computer when you’re not using it.
Save energy and keep your computer from being accessible from the Internet.
10. Trust your instincts.
If you feel like something is suspicious, error on the side of caution. If your spidy senses are tingling, trust them.
Information Technology will NEVER ask for your password!