Secure computing

12 Basic Rules of Security Awareness
  1. Never leave your computer logged on unattended, even for a minute. Remember, you are responsible for any activity performed using your user id.
  2. Always log off when you are done or are leaving your work area for an extended period of time.
  3. Create an “uncrackable/unguessable” password. A non-word with one or more numbers inserted in the middle (not on the ends) is the best choice. To make a memorable and secure password use the letters from a phrase/song, add digits, and use upper and lower case letter (I Love Paris In The Spring – ILp1TS4 – inserted number one for the I). Detailed information on creating secure passwords can be found at https://windows.microsoft.com/en-us/windows-vista/tips-for-creating-a-strong-password
  4. Do not give your password to anyone for any reason or type your password when someone is watching. Don’t write down your password, include it in automated scripts, store it on your hard drive/PDA, and don’t ask the system to remember your id and password. Employees should never log on with their user id/password and let someone else use their access.
  5. Never send confidential or personal information (e.g., password, credit card or account information, social security number, driver’s license number, etc.) through the network. Email, chat, instant messaging, Internet Relay Chat (IRC – Internet version of CB radio that lets people all over the world have real time conversations) and talk are all equally unsafe.
  6. To protect your computer against viruses and other security exploits install and routinely run anti-virus software. Update your anti-virus software regularly to ensure new virus signatures will be detected.
  7. Update your operating system on a regular basis with the latest security patches, updates and drivers. This will ensure that your computer is up-to-date and will help prevent against viruses and other security breaches.
  8. Never make or use illegal duplicates/copies of software, manuals, images, music, video, etc.
  9. Dispose of personal or confidential information in a secure manner (e.g., shred, wipe, incinerate).
  10. Make sure your data and applications are properly backed up. Store backups in a location away form the original source of the data (e.g., hard drive).
  11. Make sure you protect your computer with surge protectors, by not eating or drinking near it, and by keeping your work area clean.
  12. Maintain the confidentiality of all data, keeping in mind the privacy of all individuals.

You are the first defense stronghold in the fight to keep your computer free of spam, spyware and viruses. Downloading software or opening an email attachment can infect your computer with spyware or a computer virus. Be aware that spyware programs may “piggy back” on “free” computer downloads and that email attachments may not be what they seem to be.

GCC allows free and open communication that is essential for educational and collaboration. GCC IT does not monitor or track Internet activity. Please browse cautiously! A link may lead to interesting information or to download software without your knowledge. For more information: https://www.staysafeonline.org/

Use the online resources below to find out more about computer security:

Adware & spyware prevention

Adware and spyware prevention can be accomplished by adhering to the following guidelines:

  • Make sure your computer’s built-in firewall is enabled.
  • Use your web browser’s security settings.
  • Keep your computer up to date with the latest security patch at https://www.microsoft.com/download/en/default.aspx.
  • Use adware protection programs such as AdAware Personal Edition to protect your computer.
  • Use spyware protection programs such as Spybot Search & Destroy to protect your computer.
  • Use a malware removal tool such as Malwarebytes’ Anti-Malware.
  • Be cautious when downloading or visiting unknown web sites.
  • Read the End User License Agreement (EULA) of software you do download.
  • Exit Pop-up windows or programs by using the close button in the window’s title bar rather than clicking buttons within the window.
Phishing

Phishing is a way of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Phishing refers to a specific criminal practice that combines technology and social engineering in an attempt to try and get you to divulge personal information, such as a social security or bank account number. Phishing attempts are most commonly sent via email. For more information: https://en.wikipedia.org/wiki/Phishing

  • DO NOT reply to email with any personal information. If you have reason to believe that the request is real, call the institution or company directly.
  • DO NOT click a link in an email message. If you have reason to believe the request is real, type the web address for the company or institution directly into your web browser.
  • Detailed information on protecting yourself from phishing and other scams: https://www.sec.gov/investor/pubs/phishing.htm

To learn in depth how to recognize phishing please visit Microsoft’s website on the issue at https://www.microsoft.com/security/online-privacy/phishing-symptoms.aspx

Wireless & security

There are several things to keep in mind when using a wireless network connection. The first is that it is a shared system. It is not recommended to use the wireless network to download streaming video or audio feeds. Another potential problem with wireless networks is radio frequency interference. The radio frequency range used by the wireless network is becoming very crowded with all types of devices (in addition to networking devices) and raises the very real possibility of harmful interference affecting wireless services. There are also environmental considerations such as building composition and even weather than can affect wireless functionality.

Virus protection

Virus prevention can be accomplished by adhering to the following guidelines:

  • Use virus protection programs such as Microsoft Security Essentials or MacAfee. Having the program loaded on your computer is not enough! You should always run live updates to download new virus definitions.
  • Keep your computer up to date with the latest security patch at windowsupdate.com.
  • Make sure your computer’s built-in firewall is enabled.

Locking your computer and waking from sleep

A quick way to prevent physical access to your computer when you walk away from it is to lock it or to put it to sleep. You can leave all your files open when relying on this method. When you unlock it or wake it up, you will be back where you were when you left the computer.

  • On Windows 2000 Professional and Windows XP Professional, press [Ctrl+Alt+Delete], then click Lock Computer. With the Windows 2000 or XP lock, anyone walking up to your computer will need to enter the password for your login.
  • On Mac OS X, select System Preferences from the Apple menu, then Desktop & Screen. Click on the Screen Saver tab. Select the screen saver you like. You can also specify the number of minutes of inactivity before the screen saver starts. To require a password when the computer awakes, select System Preferences, then Security. Check the setting for Require password to wake this computer from sleep or screen saver. When you leave your computer, you can select Sleep from the Apple menu. Anyone waking up your computer will need to enter the password for your login.