To create and maintain a safe computing environment on your personal computer, be sure to...
- Use anti-virus software and keep virus definitions up-to-date. AntiVirus software is available for all Clarion students and employees. See the Computing Services Anti-Virus Software page for complete information.
- Download and install operating system and 3rd party patches. Download the appropriate updates and patches for your Operating System on a regular basis. Updates can be found at the Windows Update page on the Microsoft site http://windowsupdate.microsoft.com/ or the Apple update site http://www.apple.com/support/downloads/.
- For additional instructions for home computer security setting, see the following site:
- Microsoft At Home security site.
** For safe computing tips for your personal mobile device, please see our Safe Computing - Mobile Devices site.
Note: the information provided here was developed to assist home users with personally owned computers. If you have questions or concerns about University owned equipment, please contact the Help Desk
Here are other general security considerations with your personal computer usage:
- Back up your data.
Here is a simple, basic backup plan. Plug a good-sized, formatted, blank thumb drive (or "USB stick") into your computer. Double click on it and open a directory. As you work on your latest project and it comes time to take a break, save your work, close those crucial files, and drag copy them into the directory of the thumb drive. The more important your project is and the closer you get to the deadline, the more often you should pause to make a copy of your crucial files. The more often you backup, the less you stand you lose. After you've made a backup by whatever means, check to make sure that the copies are complete and that they work. At the office, check with IT about using a thumb drive. Some organizations do not allow them.
- Use email wisely.
Email is not private. Never send personal or sensitive information by email. Never view, open, or even click on email attachments unless you know who sent it, why they sent it, and what's in it. Even messages forwarded to you by friends might contain infected attachments and links that will shuttle you off to dangerous websites.
- Regard the Internet as a bad neighborhood at 2:00 AM.
In 2008 about 1.5 billion people were using the Internet worldwide, and the number of websites approached 200,000,000. With that many apples in the barrel, it's anybody's guess how many are rotten. The steady growth of Web commerce attracts not only ordinary scammers, pirates, and thieves, but also national and multi-national organized crime syndicates. Criminal activity for financial gain is the single largest driver of massive increases in Internet threats, and bringing Internet criminals to justice remains a challenging task. Practice online safety. Protect your privacy, your identity, and your money.
- Ratchet up your browser's security.
Malicious hackers and virus writers can infect your computer by taking advantage of low security settings in your browser software and enticing you to visit a malicious website. You can help limit your chances of being attacked by increasing your security settings and conducting business or entering sensitive information only on secure websites. Look for addresses that begin with https:// and check for the yellow security lock icon at the bottom of your browser window.
- Protect sensitive information, especially when you use a public computer.
It's best to avoid typing your credit card number, or other financial or sensitive information into any public computer, but sometimes you can't avoid it. Don't save your logon information. Don't leave a public computer unattended with sensitive information on the screen. Web browsers keep a record of your passwords and every page you visit, even after you've closed them and logged out. Learn how to erase your tracks. Watch for over-the-shoulder snoops.
- Be careful with wireless networks.
Secure your own wireless network by enabling and using wireless encryption that scrambles the data transmitted between your PC and your wireless router. Check your WAP (wireless access point) to find out what kinds of encryption it can provide. Out of the box, the encryption on most WAP's will be shut off. The most effective encryption is WPA2 (Wireless Protected Access version 2). Use a strong password for your WPA2 encryption key. Before you connect to someone else's wireless network, make sure it's a legitimate hotspot: Nefarious types have been known to set up pirate WAP's with familiar names like "wayport" or "t-mobile," and then use them to capture passwords and other private data. Verify that your two-way software firewall is turned on, and that filesharing is off. Always turn your Wi-Fi networking off when you're not at a hotspot.