Good Security Habits

Cyber Security - Key and @ SignThe next installment of this series of articles on computer security is from US-CERT and addresses several good security habits we should all adopt.  It’s my experience that there is no one action or tool that will provide a secure computing environment.  It requires a mindset that good security practices are important; some understanding of a secure computing environment; and all this begins with knowledge of good basic security habits.  This article addresses the latter and is aimed at the home computer user.

 

National Cyber Alert System

Cyber Security Tip ST04-003

There are some simple habits you can adopt that, if performed consistently, may dramatically reduce the chances that the information on your computer will be lost or corrupted.

How can you minimize the access other people have to your information?

You may be able to easily identify people who could, legitimately or not, gain physical access to your computer—family members, roommates, co-workers, members of a cleaning crew, and maybe others. Identifying the people who could gain remote access to your computer becomes much more difficult. As long as you have a computer and connect it to a network, you are vulnerable to someone or something else accessing or corrupting your information; however, you can develop habits that make it more difficult.

  • Lock your computer when you are away from it. Even if you only step away from your computer for a few minutes, it’s enough time for someone else to destroy or corrupt your information. Locking your computer prevents another person from being able to simply sit down at your computer and access all of your information.
  • Disconnect your computer from the Internet when you aren’t using it. The development of technologies such as DSL and cable modems have made it possible for users to be online all the time, but this convenience comes with risks. The likelihood that attackers or viruses scanning the network for available computers will target your computer becomes much higher if your computer is always connected. Depending on what method you use to connect to the Internet, disconnecting may mean disabling a wireless connection, turning off your computer or modem, or disconnecting cables. When you are connected, make sure that you have a firewall enabled (see Understanding Firewalls for more information).
  • Evaluate your security settings. Most software, including browsers and email programs, offers a variety of features that you can tailor to meet your needs and requirements. Enabling certain features to increase convenience or functionality may leave you more vulnerable to being attacked. It is important to examine the settings, particularly the security settings, and select options that meet your needs without putting you at increased risk. If you install a patch or a new version of the software, or if you hear of something that might affect your settings, reevaluate your settings to make sure they are still appropriate (see Understanding Patches, Safeguarding Your Data, and Evaluating Your Web Browser’s Security Settings for more information).

What other steps can you take?

Sometimes the threats to your information aren’t from other people but from natural or technological causes. Although there is no way to control or prevent these problems, you can prepare for them and try to minimize the damage.

  • Protect your computer against power surges and brief outages. Aside from providing outlets to plug in your computer and all of its peripherals, some power strips protect your computer against power surges. Many power strips now advertise compensation if they do not effectively protect your computer. Power strips alone will not protect you from power outages, but there are products that do offer an uninterruptible power supply when there are power surges or outages. During a lightning storm or construction work that increases the odds of power surges, consider shutting your computer down and unplugging it from all power sources.
  • Back up all of your data. Whether or not you take steps to protect yourself, there will always be a possibility that something will happen to destroy your data. You have probably already experienced this at least once— losing one or more files due to an accident, a virus or worm, a natural event, or a problem with your equipment. Regularly backing up your data on a CD or network reduces the stress and other negative consequences that result from losing important information (see Real-World Warnings Keep You Safe Online for more information). Determining how often to back up your data is a personal decision. If you are constantly adding or changing data, you may find weekly backups to be the best alternative; if your content rarely changes, you may decide that your backups do not need to be as frequent. You don’t need to back up software that you own on CD-ROM or DVD-ROM—you can reinstall the software from the original media if necessary.

Both the National Cyber Security Alliance and US-CERT have identified this topic as one of the top tips for home users.


Authors: Mindi McDowell, Allen Householder


Copyright 2004 Carnegie Mellon University. Terms of use

US-CERT

Advertisements

3 Comments

Filed under home computing, How-To Corner, Internet, security

3 responses to “Good Security Habits

  1. Pingback: Geek Squeaks’ of the Week (#62) « What's On My PC

  2. There it is in a nutshell.

    Reading this particular rendition, I found just one minor (and I mean, small) thing I might want to .. um, er, “modify” a bit, and that is this line: “During a lightning storm or construction work that increases the odds of power surges, consider shutting your computer down and unplugging it from all power sources.
    I might make it a little less casually suggestive (“consider”) and make it more dictatorial: “if you see lightning, unplug.” But that’s just me being me.

    As a tech, I cannot tell you how many times a week a situation I encounter makes me wish this “instruction sheet” was included with all new computers..

    • Paul,
      I agree with your suggested change of intensity on the lightening thing. I had lightening strike the fireplace chimney of my house once. Besides blowing the chimney apart, it fried all my electronics, including my PC, which was off at the time. The damaging electric current came through the wiring in the house and destroyed everything plugged into a receptical. Thanks for the great comment…and for dropping by.
      Paul

What do you think?

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s