Welcome to Safe Computing Welcome to UCI’s Safe Computing presentation. This presentation is for all employees who use a computer on any UCI network. Computer security is everyone’s responsibility. Our goal is to make safe computing easier for everyone. 8 Steps to Secure Your Computer
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Welcome to UCI’s Safe Computing presentation. This presentation is for all employees who use a computer on any UCI network.
Computer security is everyone’s responsibility. Our goal is to make safe computing easier for everyone.
If you use the Windows Operating System, there are some critical steps to take during installation. This is to prevent your computer from being attacked or infected as soon as it is on the network.
Web site with instructions:
Most security issues are related to vulnerabilities in the Operating System. As these flaws are discovered, software companies release patches and updates to protect you from security holes.
If your computer is connected to the Internet or you share files with anyone, you need anti-virus software.
How to Get Anti-virus software
Keep the virus definitions up to date.
The easiest way to break into your computer is a weak or blank password. If your computer is compromised it can be used to attack other computers on campus or around the world.
A firewall can protect your computer against hackers and other security attacks. The latest versions of Windows, Linux and the Macintosh operating systems have basic built in firewalls.
Spyware is software that is downloaded and installed onto your computer, often without your knowledge. Spyware monitors and shares your information while you browse the Internet.
Since no system is completely secure, you should regularly back up important files. This is also your best defense against losing files to viruses, software or hardware failure, or the loss or theft of your computer.
When you are away from your computer, lock the screen or set a screen saver password. This will prevent someone from using your computer when you are away from your desk.
Most common email viruses are spread through email attachments. Attachments are files that are sent along with the message. If an attachment has a virus it is usually spread when you double-click or open the file. You can minimize the risk of getting a virus from an attachment by following a few few simple rules.
Spam is often more of an annoyance than a security risk. However many email viruses are sent as spam and can be caught by spam filters. If you use NACS MailBox Services, you can use a simple Web tool to set up spam filters.
Setting up spam filters on NACS MailBox Services.
If you receive your email from another server on campus, you may have spam filtering as well. Check with your local computer support.
Phishing emails are an attempt by thieves to lure you into divulging personal and financial information, for their profit. They pretend to be from well-known legitimate businesses, and increasingly look as if they actually are. They use clever techniques to induce a sense of urgency on your part so that you don't stop to think about whether they are legitimate or not. You can learn to know what to look for and where to report these scams when you find them.
6 Ways to Recognize Phishing
Although it's convenient to send colleagues sensitive datain email, it is unsafe. Not only is email an insecure way of sending information, you've lost control over that information once you hit the send button.
The Risks of Sending Sensitive Data in Email
Alternatives to Sending Sensitive Data in Email
Virus infections are increasing by clicking on links in IM.
Mobile computing offers the freedom of using your notebook computer or other mobile device in many remote locations. With this freedom also comes greater responsibility to keep the computer and information secure.
WiFi networks are a shared network that makes it easier for others to eavesdrop on your communication.
The information on your computer is often more valuable than the equipment itself. If sensitive data is lost, California law requires that consumers be notified.
What is Sensitive Data?
Do you store sensitive data?
More information can be found on the Safe Computing Website.
What to do if sensitive data has been compromised.
More information: http://www.policies.uci.edu/adm/procs/800/800-17.html
Symptoms of a compromised computer
Campus Computing Help Desks