Difference between revisions of "User:Rewood/Computing Security Best Practices"

From WolfTech
Jump to navigation Jump to search
 
 
(One intermediate revision by the same user not shown)
Line 1: Line 1:
In addition to email security measures, there are other computing security practices you should observe, as appropriate for your situation. The discussion is aimed at Windows users but may be applicable to other operating systems as well. In addition to email security measures, there are other computing security practices you should observe, as appropriate for your situation. The discussion is aimed at Windows users but may be applicable to other operating systems as well. If you are using Windows, we strongly urge you to read and follow the suggestions on the following pages, as applicable: 7 Steps to Personal Computing Security http://www.microsoft.com/security/articles/steps_default.asp Microsoft Security & Privacy for Home Users http://www.microsoft.com/security/home/ Labmice Network and System Security http://www.labmice.net/Security/default.htm Other Practices Limit services running on your computer. Do not install, run, or enable run services such as a web server, mail server, ftp server, remote access, and the like unless you need them. If you do, you must be hypervigilant about security announcements and patches, or your odds of being hacked are quite high. Observe good password practices. For Windows NT, 2000, and XP systems, make sure that a strong password is created for the administrator account and for any users accounts. The guest account should be disabled. Don't enable autocomplete and "remember this password" for login forms--especially on laptops. Otherwise you're making it a lot easier for a thief to connect to the same things that you do. Most of the computers stolen on campus and elsewhere are laptops. Avoid sharing when possible. Avoid using Microsoft file and printer peer-to-peer sharing whenever possible. If you must share, protect all shares with strong passwords and limit access as much as possible. Monitor your unused disk space regularly. If you see a large, unexplained drop in available space, investigate the cause. Back up your locally stored data regularly. Could you afford to lose both your computer and all your data forever? If you don't do backups, you'll eventually have a catastrophe resulting from one of many potential causes, and you'll be very sorry. You will have only yourself to blame. Keep copies of your backups in another location. What would you do if both your computer and your latest backup were stolen? Scan new software. Always run virus scans on downloaded software or software provided to you by someone else on disk before you run it.
+
In addition to email security measures, there are other computing security practices you should observe, as appropriate for your situation. The discussion is aimed at Windows users but may be applicable to other operating systems as well.  
 +
 
 +
In addition to email security measures, there are other computing security practices you should observe, as appropriate for your situation.  
 +
 
 +
The discussion is aimed at Windows users but may be applicable to other operating systems as well. If you are using Windows, we strongly urge you to read and follow the suggestions on the following pages, as applicable:  
 +
 
 +
*[http://www.microsoft.com/security/articles/steps_default.asp 7 Steps to Personal Computing Security
 +
*[http://www.microsoft.com/security/home/ Microsoft Security & Privacy for Home Users] 
 +
*[http://www.labmice.net/Security/default.htm Labmice Network and System Security]
 +
 
 +
Other Practices Limit services running on your computer.  
 +
 
 +
Do not install, run, or enable run services such as a  
 +
*web server  
 +
*mail server  
 +
*ftp server  
 +
*remote access  
 +
*or the like unless you need them.  
 +
 
 +
If you do, you must be hypervigilant about security announcements and patches, or your odds of being hacked are quite high.  
 +
 
 +
'''Observe good password practices'''
 +
 
 +
For Windows NT, 2000, and XP systems, make sure that a strong password is created for the administrator account and for any users accounts. The guest account should be disabled. Don't enable autocomplete and "remember this password" for login forms--especially on laptops. Otherwise you're making it a lot easier for a thief to connect to the same things that you do. Most of the computers stolen on campus and elsewhere are laptops.  
 +
 
 +
Avoid sharing when possible. Avoid using Microsoft file and printer peer-to-peer sharing whenever possible. If you must share, protect all shares with strong passwords and limit access as much as possible.  
 +
 
 +
Monitor your unused disk space regularly. If you see a large, unexplained drop in available space, investigate the cause.  
 +
 
 +
Back up your locally stored data regularly. Could you afford to lose both your computer and all your data forever? If you don't do backups, you'll eventually have a catastrophe resulting from one of many potential causes, and you'll be very sorry. You will have only yourself to blame. Keep copies of your backups in another location. What would you do if both your computer and your latest backup were stolen?  
 +
 
 +
Scan new software. Always run virus scans on downloaded software or software provided to you by someone else on disk before you run it.

Latest revision as of 10:11, 22 March 2006

In addition to email security measures, there are other computing security practices you should observe, as appropriate for your situation. The discussion is aimed at Windows users but may be applicable to other operating systems as well.

In addition to email security measures, there are other computing security practices you should observe, as appropriate for your situation.

The discussion is aimed at Windows users but may be applicable to other operating systems as well. If you are using Windows, we strongly urge you to read and follow the suggestions on the following pages, as applicable:

Other Practices Limit services running on your computer.

Do not install, run, or enable run services such as a

  • web server
  • mail server
  • ftp server
  • remote access
  • or the like unless you need them.

If you do, you must be hypervigilant about security announcements and patches, or your odds of being hacked are quite high.

Observe good password practices

For Windows NT, 2000, and XP systems, make sure that a strong password is created for the administrator account and for any users accounts. The guest account should be disabled. Don't enable autocomplete and "remember this password" for login forms--especially on laptops. Otherwise you're making it a lot easier for a thief to connect to the same things that you do. Most of the computers stolen on campus and elsewhere are laptops.

Avoid sharing when possible. Avoid using Microsoft file and printer peer-to-peer sharing whenever possible. If you must share, protect all shares with strong passwords and limit access as much as possible.

Monitor your unused disk space regularly. If you see a large, unexplained drop in available space, investigate the cause.

Back up your locally stored data regularly. Could you afford to lose both your computer and all your data forever? If you don't do backups, you'll eventually have a catastrophe resulting from one of many potential causes, and you'll be very sorry. You will have only yourself to blame. Keep copies of your backups in another location. What would you do if both your computer and your latest backup were stolen?

Scan new software. Always run virus scans on downloaded software or software provided to you by someone else on disk before you run it.