Computer Tips
Physical Laptop Security
- Lock it up, and don’t leave it out.
- If you do leave it out, lock it down.
User Account Password
- Don’t use blank passwords, simple passwords (“password”, “password1”, “John316”), short passwords, or passwords containing recognizable patterns (lines from movies, books, or songs; common phrases).
- Use longer passphrases, especially strings of 4-7 random unrelated words ("octopUsforkLiFtmilitaryabStraCTtubular").
- Incorporate uppercase and lowercase letters, and numbers.
- Change your password (once, twice, thrice a year).
- Never share your password with anyone, or write it down where it could be found.
Software and OS Updates
Set your computer to automatically install the critical updates and patches for your operating system (Windows or and Mac OS ) and antivirus and malware applications. Your computer is vulnerable when these applications are out of date. Use the latest versions.
Firewall
Keep your computer's Firewall turned on.
Enable the Screen Saver and Screen Saver Lock
- Set the screensaver to activate and lock after 5, 10, 15 minutes of inactivity.
- Lock the screen so no one can use your computer when you’re not there.
Back up your data.
- You can save copies of your files to an external USB drive.
- You can use applications like Time Machine (Mac OS).
- You can use online services like: CrashPlan, Dropbox, Mozy, BackBlaze
Privacy Tips
How Anonymous Are You?
Typically the following types of information are collected automatically:
- IP Address
- Domain Name
- OS and Software details
- Information about the pages you are visiting
Choose wisely which websites you visit.
Malicious sites leave parasites.
There’s no such thing as safe anonymous file sharing. Avoid P2P and distributed filesharing. Torrent, Kazaa, Gnutella, Morpheus and at least a dozen other file sharing networks exist. Most are free. And all are rife with trojans, viruses, worms, adware, spyware, and every other form of malicious code.
For more information, visit http://antivirus.about.com/od/securitytips/a/safetytips.htm.
Personal Information
- Choose wisely which websites to give your personal information to (address, password, credit card information).
- Browsing the web? Look for https://. The "s" means a "secure" connection. If there is no "https," don't enter your personal information.
Social Media
Be careful when posting publicly on social media sites such as Facebook and Twitter. Every time you post something about your life, you are providing personal information that can be exploited.
Mobile Devices
Don't leave your smartphone in the taxi or on the airplane. Make a habit of checking every time you move from one place to another to make sure you know where your phone is. Unauthorized access to your mobile device is a serious threat to your personal information.
Email Tips
Address Spoofing
Not all email is who is says it is from, sometime it is forged. Spoofing is a technique commonly used for spam and phishing to hide the origin of an email message. (wikipedia.org)
Phishing
Phishing is the fraudulent process of attempting to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an email. Communications purporting to be from reputable organizations or IT Administrators are commonly used to lure unsuspecting users. Phishing attempts often direct users to send a reply or enter details at a fake website whose appearance is almost identical to the legitimate website expected.
Be alert. Protect yourself. Enable 2-step verification on your email account.
Misleading Hyperlinks
Email scams often place links in messages and they try any number of techniques just to get you to click on the link. Clicking on an unknown link may seem harmless, but it makes you vulnerable. Email scams frequently place links in messages that appear to come from a service that you trust, like your bank, credit card company, or social networking site. To make these phishing e-mail messages look even more legitimate, the scam artists may place a link in them that appears to go to the legitimate Web site, but actually takes you to a phony scam site or possibly a pop-up window that looks exactly like the official site.(wikipedia.org)
Email Attachments
Attachments are a highly exploited feature of email to spread malicious code. Know the source of the attachment. If it seems weird, it is. Don’t open it. Check with the source. (US-CERT.gov)