Safe Computing

A lot of the threats today you can combat yourself, just armed with a little bit of knowledge. Internet security software is an essential piece of the cyber security pie, however, it can’t protect you form every single threat out there. Comprehensive Internet security software, coupled with a well educated user will go a long way on the threat landscape, so get your learn on, and empower yourself to navigate the web safely.

Advantages:

  • Protection from malicious attacks on your network.
  • Deletion and/or guaranteeing malicious elements within a preexisting network.
  • Prevents users from unauthorized access to the network.
  • Deny's programs from certain resources that could be infected.
  • Securing confidential information

Disadvantages:

  • Strict Regulations
  • Difficult to work with for non-technical users
  • Restrictive to resources
  • Constantly needs Patching
  • Constantly being attacked

Patch, Patch, PATCH!

An unpatched machine is more likely to have software vulnerabilities that can be exploited. Turn on automatic updates: Mac | Windows.

Install protective software:

Sophos is available as a free download from IS&T's software grid. Once installed, schedule Sophos to regularly scan and update your virus definitions automatically.

Choose strong passwords:

Strong passwords use a combination of letters, numbers, and special characters. Create a unique password for each account. LastPass can manage all of your passwords for you—and it's free.

Back up on a regular basis:

Scheduling routine backups can protect you from the unexpected. Always keep a few months' worth of retrievable backup. Download and install CrashPlan and learn how toback up your system.

Control access to your machine:

Don't leave your computer in an unsecured, public area, especially if you're logged on. This includes Athena clusters and Quickstations. The physical security of your machine is just as important as its technical security.

Use email and the internet safely:

Ignore unsolicited emails. Be wary of attachments, links, and forms in emails that come from people you don't know, or which seem "phishy." Avoid untrustworthy (often free) downloads. Learn more about dealing with spam at MIT.

Use secure connections:

When connected to the internet, your data can be vulnerable while in transit. Use remote connectivity and secure file transfer options when off campus.

Protect sensitive data:

Securely remove sensitive data files from your hard drive, especially when recycling or repurposing your computer. Protect sensitive files using the encryption tools built into your operating system.

Use desktop firewalls:

Mac and Windows computers use basic desktop firewalls to protect your computer files from being scanned. Make sure they are properly configured.

Most importantly, stay informed:

Stay current with the latest developments: Follow IS&T on Facebook and Twitter. Bookmark IS&T Secure Computing.