1 / 11

TECHNOLOGY GUIDE FIVE

This guide provides actionable tips for safeguarding your personal information, covering both behavioral precautions and computer-based actions. Learn how to protect yourself from identity theft and online threats.

skapp
Download Presentation

TECHNOLOGY GUIDE FIVE

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. TECHNOLOGY GUIDE FIVE Protecting Your Information Assets

  2. Behavioral Actions • Do not provide personal information to strangers in any format • Protect your social security number • Credit Cards • Use credit cards with your picture on them • Use virtual credit cards • Know your credit card billing cycles • Limit use of debit cards

  3. Behavioral Actions (continued) • Do not use a personal mailbox at home or at an apartment • Use a cross-cut (confetti) shredder • Sign up with a company that provides proactive protection of your personal information

  4. Computer-Based Actions • Never open unrequested attachments to e-mail files, even those from people you know and trust. • Never open attachments or Web links in e-mails from people you do not know. • Never accept files transferred to you during Internet chat or instant messaging sessions. • Never download any files or software over the Internet from Web site that you do not know.

  5. Computer-Based Actions (continued) • Never download files or software that you have not requested. • Test your system. • Run free malware scans on your computer. • Have an anti-malware product on your computer and use it (ideally at least once per week). • Have a firewall on your computer.

  6. Computer-Based Actions (continued) • antispyware product on your computer. • rootkit detection product on your computer. • monitoring software on your computer. • content filtering software on your computer. • antispam software on your computer.

  7. Computer-Based Actions (continued) • Have proactive intrusion detection and prevention software on your computer. • Manage patches. • Use a browser other than Internet Explorer. • Travel with a “sterile” laptop or no laptop. • Use two-factor authentication. • Use encryption.

  8. Computer-Based Actions (continued) • User laptop tracing tools or device reset/remote kill tools. • Turn off peer-to-peer (P2P) file sharing. • Look for new and unusual files. • Detect fake web sites. • Use strong passwords.

  9. Computer-Based Actions (continued) • Adjust privacy settings on your computer. • Surf the Web anonymously. • E-mail anonymously. • Erase your Google search history. • Personal disaster preparation: backup, backup, backup! • Carbonite

  10. Wireless Security • Hide your Service Set Identifier (SSID) • Use encryption. • Filter out media access control (MAC) addresses • Limit Internet Protocol (IP) addresses. • Sniff out intruders. • Change the default administrator password on your wireless router to something not easily guessed

  11. Wireless Security (continued) • Use virtual private networking (VPN) technology to connect to your organization’s network. • Use Remote Desktop to connect to a computer that is running at your home. • Configure windows firewall to be “on with no exceptions.” • Only use Web sites that use Secure Sockets Layer (SSL) for any financial or personal transactions Use wireless security programs.

More Related