Presentation is loading. Please wait.

Presentation is loading. Please wait.

COMPUTER SECURITY BEST PRACTICES. SECURE YOUR STUFF!  Physically secure your workstation by locking your screen when away  Secure any small, easy to.

Similar presentations


Presentation on theme: "COMPUTER SECURITY BEST PRACTICES. SECURE YOUR STUFF!  Physically secure your workstation by locking your screen when away  Secure any small, easy to."— Presentation transcript:

1 COMPUTER SECURITY BEST PRACTICES

2 SECURE YOUR STUFF!  Physically secure your workstation by locking your screen when away  Secure any small, easy to transport items when you are away from the office (laptops, ipads, portable drives)  Lock doors when necessary and pay attention to unfamiliar personnel  Don’t give out sensitive or confidential information via phone or in person

3 ANTIVIRUS  Have an anti-virus or combo anti- virus/anti-malware program installed  Make sure you aren’t running a “trial” or “demo” version that has expired  Check the settings to be sure updates and routine scans are scheduled  Don’t ignore warnings or alerts

4 KEEP UP TO DATE  Apply updates for security vulnerabilities  This includes your Operating Systems (Microsoft Windows/ Mac OS/ Linux, etc.)  Also includes updates specific to any applications you may use (Adobe Products, Mozilla Firefox, Internet Explorer, etc.)  If these are scheduled to run automatically, periodically check to be sure they are completing successfully

5 SAFE SURFING  Be very cautious concerning which sites you surf on internet  Block pop-ups if at all possible  Be very cautious with links, games and apps via Social Networking (Facebook, Twitter, etc.)  Don’t respond to emails or phone calls requesting sensitive/confidential/personal information. This could also be via email requests or by clicking a link in an email –even from someone you know

6 USE AND STORAGE OF SENSITIVE INFORMATION  Understand what this means (Sensitive)  Re-evaluate the way you work (Is there a better way to accomplish your task – with no need for sensitive information to be collected, stored or accessed?)  If you have a Business need or other requirement (State/Federal Laws, Grants) to work with this type of information, understand the requirements for safely accessing, storing, and archiving  Check with your tech support to implement requirements


Download ppt "COMPUTER SECURITY BEST PRACTICES. SECURE YOUR STUFF!  Physically secure your workstation by locking your screen when away  Secure any small, easy to."

Similar presentations


Ads by Google