60 likes | 166 Views
Protect your digital workspace with essential computer security best practices. Begin by physically securing your workstation—always lock your screen when stepping away. Safeguard any transportable devices like laptops and tablets, and be vigilant about locking doors and being aware of unfamiliar personnel. Use reputable antivirus software with scheduled scans and updates to safeguard against malware. Be cautious online, avoiding dubious sites and ignoring requests for sensitive information. Understand the implications of handling sensitive data and follow proper protocols to ensure the security of your information.
E N D
COMPUTER SECURITY BEST PRACTICES
SECURE YOUR STUFF! • Physically secure your workstation by locking your screen when away • Secure any small, easy to transport items when you are away from the office (laptops, ipads, portable drives) • Lock doors when necessary and pay attention to unfamiliar personnel • Don’t give out sensitive or confidential information via phone or in person
ANTIVIRUS • Have an anti-virus or combo anti-virus/anti-malware program installed • Make sure you aren’t running a “trial” or “demo” version that has expired • Check the settings to be sure updates and routine scans are scheduled • Don’t ignore warnings or alerts
KEEP UP TO DATE • Apply updates for security vulnerabilities • This includes your Operating Systems (Microsoft Windows/ Mac OS/ Linux, etc.) • Also includes updates specific to any applications you may use (Adobe Products, Mozilla Firefox, Internet Explorer, etc.) • If these are scheduled to run automatically, periodically check to be sure they are completing successfully
SAFE SURFING • Be very cautious concerning which sites you surf on internet • Block pop-ups if at all possible • Be very cautious with links, games and apps via Social Networking (Facebook, Twitter, etc.) • Don’t respond to emails or phone calls requesting sensitive/confidential/personal information. This could also be via email requests or by clicking a link in an email –even from someone you know
USE AND STORAGE OF SENSITIVE INFORMATION • Understand what this means (Sensitive) • Re-evaluate the way you work (Is there a better way to accomplish your task – with no need for sensitive information to be collected, stored or accessed?) • If you have a Business need or other requirement (State/Federal Laws, Grants) to work with this type of information, understand the requirements for safely accessing, storing, and archiving • Check with your tech support to implement requirements