Top 10 Security Practices | Information Security (2024)

1. & 2. Install anti-virus software and keep all computer software patched. Update operating systems, applications, and antivirus software regularly

Software can include bugs which allow someone to monitor or control the computer systems you use. In order to limit these vulnerabilities, make sure that you follow the instructions provided by software vendors to apply the latest fixes. Antivirus and anti-spyware software should also be installed and kept up to date. Did you know Cal Poly offers anti-virus software at no charge to all students, faculty and staff for their personal use? For more information, see: Viruses and Spyware and the Information Security Forum: Safe Computing presentation (PDF).

3. Use a strong password

Reusing passwords or using the same password all over the place is like carrying one key that unlocks your house, your car, your office, your briefcase, and your safety deposit box. If you reuse passwords for more than one computer, account, website, or other secure system, keep in mind that all of those computers, accounts, websites and secure systems will be only as secure as the least secure system on which you have used that password. Don't enter your password on untrusted systems. One lost key could let a thief unlock all the doors. Remember to change your passwords on a schedule to keep them fresh. Visit Cal Poly Password Manager for additional information and suggestions to ensure compliance with Cal Poly password requirements.

4. Log off public computers

Cybercafe's and hotel business centers offer a convenient way to use a networked computer when you are away from home or your office. But be careful. It's impossible for an ordinary user to tell what the state of their security might be. Since anyone can use them for anything, they have probably been exposed to viruses, worms, trojans, keyloggers, and other nasty malware. Should you use them at all? They're okay for casual web browsing, but they're NOT okay for connecting to your email, which may contain personal information; to any secure system, like the network or server at your office, bank or credit union; or for shopping online. (SANS.org). When using a public area computer, be sure to completely log off when you are finished using it. This will ensure that the next person cannot access your information. Please see our tips on traveling with devices and connecting to the Internet for more advice in this area.

5. Back up important information ... and verify that you can restore it

Due to hardware failure, virus infection, or other causes you may find yourself in a situation where information stored on the device you use is not accessible. Be sure to regularly back up any data which is important to you personally or your role at Cal Poly. StaySafeOnline offers tips on how to back up your important information. For university employees, confidentialdata backups or copies must be stored securely as stated in the Cal Poly Information Classification and Handling Standard. If applicable, check with your technical support staff to determine if a server-hosted solution is available to meet your needs, as this will better ensure that your data is protected and available when you need it.

6. Keep personal information safe

Be wary of suspicious e-mails

Never respond to emails asking you to disclose any personal information. Cal Poly will never email you asking for your personal information. A common fraud, called "phishing", sends messages that appear to be from a bank, shop or auction, giving a link to a fake website and asking you to follow that link and confirm your account details. The fraudsters then use your account details to buy stuff or transfer money out of the account (SANS.org). Embedded links may also include viruses and malware that are automatically installed on your computer. Cal Poly makes every effort to prevent viruses and other malicious content from reaching your campus email account, but even emails which appear to be from a trustworthy source may be forged. Exercise caution, and when in doubt do not follow links or open attachments from a suspicious message or someone you know unless you are expecting it. View our Safe Computing Presentation (PDF) and our What is Phishing? page for more information.

Pay attention to browser warnings and shop smart online

When we visit a web site, we all just want it to work. So, when a warning pops up to impede progress, instead of accepting it, it's worth slowing down to understand the risks. View the Security Certificates - Warning to protect yourself against identity theft. Credit card and online banking sites are convenient and easy ways to purchase and handle financial transactions. They are also the most frequently spoofed or "faked" sites for phishing scams. Information you provide to online banking and shopping sites should be encrypted and the site's URL should begin with https. Some browsers have an icon representing a lock at the lower right of the browser window (SANS.org). Think about using a virtual credit card or pay pal account to make the transaction instead of your credit card or debit card. More information and online shopping tips can be found at StayStafeOnline and Privacy Rights Clearinghouse.

Use secure Wi-Fi connections at home and away

Is your Wi-Fi network at home password-protected? It should be. Not having your router encrypted is an open invitation for a "bad guy" to gain access to data stored on your home PC and any other connected devices. For information to secure your wireless router at home, visit our wireless home network security presentation (PDF).

A public network is a network that is generally open (unsecured) allowing anyone access to it. These networks are available in airports, hotels, restaurants, and coffee shops, usually in the form of a Wi-Fi (wireless) connection. When you connect to a public network, your online activities and data transmissions can be monitored by others, and your device may be at risk to a potential attack. Please see our traveling with devices and connecting to the Internet page for safety tips on how to use them.

7. Limit social network information

Facebook, Twitter, Google+, YouTube, Pinterest, LinkedIn and other social networks have become an integral part of our online lives. Social networks are a great way to stay connected with others, but you should be wary about how much personal information you post. Learn how to use the privacy and security settings to protect yourself, keep personal information personal, know and manage your friends, know what to do if you encounter a problem. For these and more tips, check out the StaySafeOnline Social Networks page and the Privacy Rights Clearinghouse fact sheet on Social Networking Privacy.

8. Download files legally

Avoid peer-to-peer (P2P) networks and remove any file-sharing clients already installed on your system. Since most P2P applications have worldwide sharing turned on by default during installation, you run the risk of downloading viruses or other malware to your computer, and having your personal and/or confidential information inadvertently shared across the Internet, which could lead to identity theft. This is in addition to having your access to the Cal Poly network suspended if your device is identified as illegally sharing movies, music, TV shows or other copyrighted materials. For more information, see Cal Poly's FAQs on Copyright Infringement and File Sharing andP2P File Sharing Risks by OnGuardOnline.

9.Ctrl-ALt-Delete before you leave your seat! Lock your computer when you walk away from it

When leaving your computer unattended, physically secure it to prevent theft and lock the screen with a password to safeguard data. Or this might happen to you:

"I sent an email to your boss letting him know what you really think of him". This Notepad message was on my screen when I got back to my cubicle after getting up to stretch my legs. What? I had been gone for 180 seconds -- three quick minutes. Lucky for me, the note turned out to be from our systems administrator who wanted to make a point. All it takes is about one minute for a disgruntled colleague to send a message on your behalf to the boss and there is no way for you to prove you didn't send it. In about 30 seconds, a cracker could install a keystroke logger to capture everything you type including company secrets, user names and passwords. In about 15 seconds, a passerby could delete all your documents (SANS.org).

10. Secure your laptop, smart phone or other mobile devices

Every time a laptop computer or other portable devices are lost or stolen, the data on that device has also been stolen. If Cal Poly data is lost, accessed, or compromised as the result of a laptop, tablet, smart phone or other mobile device theft, the resulting damage can be much greater than the cost of replacing the equipment. Don't store personal data on laptops, smart phones, tablets or other mobile devices. Secure your mobile device with a password or PIN. Set an inactivity timeout and encrypt. View these and other mobile device security tips at StaySafeOnline.

If you're like most people, you've probably accumulated a lot of personal information on your phone. This valuable data makes phones a target for thieves and cybercriminals. Your phone is basically a computer and requires, patches, antivirus and anti-malware applications, as well as password protection. Most manufacturers have information on their websites and should have documentation to walk you through the security settings. We recommend that you don't store confidential information on your mobile device unless you have proper security measures in place. App stores for both iPhone and Android phones have good security applications for free, but you may have to do some research to ensure the product is safe. When choosing a mobile antivirus program, it's safest to stick with well-known brands. Otherwise, you risk getting infected by malware disguised as an antivirus application.

Those are just a few helpful hints to keep you and your devices and information secure. Please visit the following sites for more tips on how to protect yourself:

Remember, If you are unsure about something, ask for help!

Learning about information security and safe computing needn’t be a daunting task. If you have questions and you're unable to find the information on our site, please let us know. Our contacts section is a great place to start.

Top 10 Security Practices | Information Security (2024)
Top Articles
What are crypto trading pairs?
What is trading?
417-990-0201
NYT Mini Crossword today: puzzle answers for Tuesday, September 17 | Digital Trends
Tabc On The Fly Final Exam Answers
What spices do Germans cook with?
Elden Ring Dex/Int Build
No Credit Check Apartments In West Palm Beach Fl
Ap Chem Unit 8 Progress Check Mcq
5808 W 110Th St Overland Park Ks 66211 Directions
Michaels W2 Online
Lax Arrivals Volaris
Nwi Arrests Lake County
Grasons Estate Sales Tucson
What is Rumba and How to Dance the Rumba Basic — Duet Dance Studio Chicago | Ballroom Dance in Chicago
50 Shades Darker Movie 123Movies
Adam4Adam Discount Codes
Las 12 mejores subastas de carros en Los Ángeles, California - Gossip Vehiculos
Ahrefs Koopje
Popular Chinese Restaurant in Rome Closing After 37 Years
Espn Horse Racing Results
Governor Brown Signs Legislation Supporting California Legislative Women's Caucus Priorities
Who is Jenny Popach? Everything to Know About The Girl Who Allegedly Broke Into the Hype House With Her Mom
Watch Your Lie in April English Sub/Dub online Free on HiAnime.to
4Oxfun
Wku Lpn To Rn
Usa Massage Reviews
Will there be a The Tower season 4? Latest news and speculation
Albertville Memorial Funeral Home Obituaries
Halsted Bus Tracker
The Latest: Trump addresses apparent assassination attempt on X
After Transmigrating, The Fat Wife Made A Comeback! Chapter 2209 – Chapter 2209: Love at First Sight - Novel Cool
Nacogdoches, Texas: Step Back in Time in Texas' Oldest Town
Martin Village Stm 16 & Imax
Litter-Robot 3 Pinch Contact & DFI Kit
Mississippi State baseball vs Virginia score, highlights: Bulldogs crumble in the ninth, season ends in NCAA regional
2700 Yen To Usd
F9 2385
Inducement Small Bribe
Amc.santa Anita
Leland Nc Craigslist
The Great Brian Last
News & Events | Pi Recordings
Gander Mountain Mastercard Login
Understanding & Applying Carroll's Pyramid of Corporate Social Responsibility
Nkey rollover - Hitta bästa priset på Prisjakt
Gelato 47 Allbud
Philasd Zimbra
Ravenna Greataxe
Comenity/Banter
Dinargurus
Latest Posts
Article information

Author: Ray Christiansen

Last Updated:

Views: 5760

Rating: 4.9 / 5 (69 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Ray Christiansen

Birthday: 1998-05-04

Address: Apt. 814 34339 Sauer Islands, Hirtheville, GA 02446-8771

Phone: +337636892828

Job: Lead Hospitality Designer

Hobby: Urban exploration, Tai chi, Lockpicking, Fashion, Gunsmithing, Pottery, Geocaching

Introduction: My name is Ray Christiansen, I am a fair, good, cute, gentle, vast, glamorous, excited person who loves writing and wants to share my knowledge and understanding with you.