Keeping Your Computer Secure Quick Reference Guide Created: 3/16/2010 Page 1 of 1
Table Of Contents 1. Introduction... 3 2. Keeping Your Computer Up to Date... 4 2.1 Windows... 4 2.2 Mac... 6 3. Malware and Antivirus Protection... 7 3.1 Campus Solution... 7 3.2 Personal Solutions... 8 4. Strong Passwords... 8 4.1 Use a passphrase instead of a password... 8 4.2 Add complexity... 9 4.3 Test your passphrase/password... 9 4.4 Other Tips... 9 4.5 When to Change a Password... 9 5. Creating Backups of Your Files... 9 5.1 Campus Options... 9 5.2 Backup Software... 9 5.3 Commercial Options... 10 6. The Dangers of Wireless Networks... 10 7. Safe Browsing Tips... 10 7.1 Clearing Private Data... 10 8. Peer 2 Peer... 13 9. Phishing and Email Scams... 14 10. Resources... 14 Created: 3/16/2010 Page 2 of 2
1. Introduction Information technology is becoming essential in our everyday lives, including at work, on campus and at home. As such, computer security is becoming increasingly important. This guide is a supplement to the Kennesaw State University Information Technology Services miniworkshop entitled Keeping Your Computer Secure. This Quick Reference is not intended to replace the mini workshop, but instead is intended to supplement and provide a quick reference to the topics covered in the mini workshop. This Quick Reference covers the following topics: Keeping Your Computer Up to Date Malware and Antivirus Protection Strong Passwords Creating Backups of Your Files The Dangers of Wireless Networks Safe Browsing Tips Peer 2 Peer (P2P) Technology Phishing and Email Scams Created: 3/16/2010 Page 3 of 3
2. Keeping Your Computer Up to Date Note: Campus computers are set to download and install critical updates automatically. 2.1 Windows 2.1.1 To update your PC manually 1. In Windows Internet Explorer go to http://update.microsoft.com/windowsupdate/ or click on the Safety menu, then Windows Update. Windows Update may also be located under Tools or Help when using older versions of Internet Explorer. 2. Then, do one of the following: a. Click Express to check for High priority updates. Windows Update will check for High priority updates for your PC and display them for your review. Click Install Updates to install high priority updates. b. Click Custom to check for Optional updates. Windows Update will check for the latest updates for your PC. Created: 3/16/2010 Page 4 of 4
Note: If you click Custom, High priority updates will be presented for your review. Select Optional Updates from the left side of the web page by type: "Software, Optional" or "Hardware, Optional. " Source: http://www.microsoft.com/windows/downloads/windowsupdate/learn/windowsxp.mspx 2.1.2 To turn on Automatic Updates in Windows XP (SP2) 1. Click Start, and then click Control Panel. 2. Double click Automatic Updates. 3. Choose Automatic (recommended). Source: http://www.microsoft.com/windows/downloads/windowsupdate/learn/windowsxp.mspx Created: 3/16/2010 Page 5 of 5
2.2 Mac 2.2.1 Manually getting updates 1. Click on the Apple menu in the upper left corner of your screen. 2. Click Software Update in the drop down menu. 3. Your computer will search for available updates. When it finishes, select the updates you wish to apply and click Install. 2.2.2 Automatically Get Updates 1. Click on the Apple menu in the upper left corner of your screen. 2. Click on System Preferences 3. From the View menu, choose software update 4. Select the interval you would like your computer to check for updates. Created: 3/16/2010 Page 6 of 6
Note: If you are new to Apple computers, ITS Technology Outreach offers an online course as well as downloadable documentation to KSU faculty and staff. Visit http://its.kennesaw.edu/techoutreach/ for information. 3. Malware and Antivirus Protection 3.1 Campus Solution Information Technology Services provides Symantec antivirus protection to faculty, staff and students on the ITS Website at https://its.kennesaw.edu/downloads/. You must use your NetID and password to sign in to download the software. Created: 3/16/2010 Page 7 of 7
The Faculty and Staff downloads include compatibility for both 32bit and 64bit versions of Windows XP, Windows Vista and Windows 7. The Student version is only compatible with 32bit versions of Windows XP. 3.2 Personal Solutions There are a variety of other solutions available that are either free or charge a small fee. Some examples are below: AVG o http://www.avg.com Microsoft Security Essentials o http://www.microsoft.com/security_essentials/ Avast o http://www.avast.com Avira o http://www.avira.com/ ClamAV o http://www.clamav.net/ Note: Running more than one antivirus solution at a time may cause adverse effects. Uninstall your old antivirus solution before installing a new one. Note: If you believe a file might have a virus, you can upload it to http://www.virustotal.com/ or http://virscan.org/ and scan it with various antivirus products. After the scan is complete, either of the websites will tell you if the file is infected and what product detected it. Please note that no single product detects all instances of malware. 4. Strong Passwords 4.1 Use a passphrase instead of a password Passphrases can be much more complex than passwords making them more secure. Example: thetrafficon575washorribletoday Created: 3/16/2010 Page 8 of 8
4.2 Add complexity For a stronger password, use capital and lower case letters, numbers and special characters. For example: password becomes P@$$w012d 4.3 Test your passphrase/password Microsoft s Password Checker: https://www.microsoft.com/protect/fraud/passwords/checker.aspx Note: Keep your password a secret. Information Technology Support Professionals, either on campus or in your personal life, should never need your password. 4.4 Other Tips Keep your password a secret Do not type passwords on computers that you do not trust o Especially passwords to sensitive accounts (i.e. KSU Email, Banking, etc) Use more than one password 4.5 When to Change a Password There are several theories about when you should change your password. Below are just a few options but you should always change your password when you believe it has been compromised and ideally passwords should also be changed regularly. Every 30 / 60 / 90 days KSU User Accounts & Password Policy: Semiannually 5. Creating Backups of Your Files 5.1 Campus Options The I Drive or M Drive https://files.kennesaw.edu USB External Drives USB Thumb Drives CDs / DVDs 5.2 Backup Software Backup And Restore for Windows Time Machine for Mac Created: 3/16/2010 Page 9 of 9
Note: Securely store any media you may use for backups. 5.3 Commercial Options There are several options available for personal backups. However, you should never use personal backup services to store Kennesaw State University data. Doing so violates University policy and may violate several laws. Some of the more reputable services are below: Carbonite o http://www.carbonite.com/ Mozy o http://mozy.com/ MobileMe o http://www.apple.com/mobileme/ DropBox o https://www.dropbox.com/ 6. The Dangers of Wireless Networks Do not trust unencrypted connections. Be leery of free wifi as what you are doing could be seen by someone under the right circumstances. Also, free wifi hotspots might also be malicious in nature (i.e. they may monitor your actions or capture what you type.) Look for the lock either in your browser s address bar windows or at the bottom of the browser to indicate a secure connection. Always be mindful of who is behind you and who can see your screen in a public place. 7. Safe Browsing Tips When possible, use secure connections Use the security features within your browser Clear any private data stored in your browser regularly Avoid using sites that you do not personally trust Lock your workstation whenever you leave it o Windows Press the Windows Key and L 7.1 Clearing Private Data 7.1.1 Internet Explorer Created: 3/16/2010 Page 10 of 10
1. Click Tools > Delete Browsing History 2. Click Delete all 3. Click Yes to confirm that you wish to delete all files from the cache. 4. Close and restart your browser. 7.1.2 Firefox 1. Click Tools > Clear Recent History Created: 3/16/2010 Page 11 of 11
2. In the drop down box, select Everything 3. Click Clear Now 4. Close and restart your browser. 7.1.3 Safari 1. Open Safari 2. In the Safari Menu, select Safari then select Reset Safari Created: 3/16/2010 Page 12 of 12
3. Ensure all of the check boxes are checked then click Reset 8. Peer 2 Peer Peer 2 Peer (P2P) technology presents a great way to share legal materials in a distributed fashion but this technology is easily abused for illegal purposes. Illegal copies of music, videos, software, etc can contain malware and violate the owners copy right protection. Malicious material may cause irreparable harm to your computer and data. Violating copy right law can result in result in fines and other legal action. Created: 3/16/2010 Page 13 of 13
9. Phishing and Email Scams Avoid clicking on links in emails, instead type the address in manually Avoid opening unexpected attachments or attachments from unexpected senders Verify contact information for someone before trusting it If it sounds suspicious or to good to be true, then it probably is ITS will never ask for your password or other personal information via email When in doubt about the validity of an email or communication, contact the KSU Service Desk http://www.microsoft.com/protect/fraud/phishing/symptoms.aspx 10. Resources UITS Website o Main Website: http://uits.kennesaw.edu/ Faculty and Staff Service Desk o service@kennesaw.edu o 470 578 6999 Student Service Desk o studenthelpdesk@kennesaw.edu o 470-578- 3555 Anonymously Report Computer Abuse o http://www.kennesaw.edu/infosec/abuse.html o abuse@kennesaw.edu Created: 3/16/2010 Page 14 of 14