Keeping Your Computer Secure Quick Reference Guide

Similar documents
Connecting to KSUGuest WiFi on Windows 10

Registering an ipad for Duo Two-Factor Authentication

Connecting to KSUGuest WiFi on Windows 8.1

Registering an Android Tablet for Duo Two-Factor Authentication

Registering an iphone for Duo Two-Factor Authentication

NUIT Tech Talk: Data and Information Security at Northwestern January 24, 2007

SoftChalk Cloud and D2L Quick Guide This document was created with SoftChalk Create 10, available at

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

Accessing DocuSign and Changing User Settings

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Keeping Your PC Safe. Tips on Safe Computing from Doug Copley

Virtual Owl. Guide for Windows. Office of the Chief Information Officer. Learning Technologies, Training, Audiovisual, and Outreach

Adding Attachments in the Microsoft Outlook Web App

Connecting from Off-Campus to Your Office Mac Using a Windows 10 PC

NUIT Tech Talk: Agenda

Connecting from Off Campus to Your Campus PC on MacOS. Preparing to Connect to Your Campus (Office) Windows 10 PC

Discount Kaspersky PURE 3.0 internet download software for windows 8 ]

INTERNET SAFETY IS IMPORTANT

Files.Kennesaw.Edu. Kennesaw State University Information Technology Services. Introduces. Presented by the ITS Technology Outreach Team

How To Remove Software Manually Windows Xp Password Login

Course Outline (version 2)

Manual Removal Norton Internet Security Won't Open Or

Computing at MIT: Basics

Duplication and/or selling of the i-safe copyrighted materials, or any other form of unauthorized use of this material, is against the law.

3.5 SECURITY. How can you reduce the risk of getting a virus?

Cybersecurity For The Small Business & Home User ( Geared toward Windows, but relevant to Apple )

Airtel PC Secure Trouble Shooting Guide

Connecting from Off Campus to Your Campus PC Using ios Devices

Creating Folder Shares in the Microsoft Outlook Web App

Getting Started with Remotix for Remote Connection to a Mac Using Windows 10

School of Computing & Information Systems

Xp Activation Message

NUIT Tech Talk: Get to Know Your Computer

FAQ: Privacy, Security, and Data Protection at Libraries

Security Awareness Training June 2016

Download firefox with virus protection

Creating Calendar Shares in Microsoft Outlook 2016 for PC Sharing a Calendar

KSI/KAI Cyber Security Policy / Procedures For Registered Reps


Firewall Antivirus For Windows Xp Full Version 2013

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE

Symantec Endpoint Protection Installation Guide

BEST PRACTICES FOR PERSONAL Security

Desire2Learn. Student Guide. Information Technology Services. Outreach and Distance Learning Technologies

Perform Manual System Restore Xp Safe Mode Not Working

How to use a computer safely Tips and Tricks. Dr. Pierre Darmon

I Want To Wipe My Computer Clean And Start Over Windows 7

HallPass Instructions for Connecting to PC with an Android Device

Securing the SMB Cloud Generation

Manually Remove Of Xp Internet Security Protect

PRACTICING SAFE COMPUTING AT HOME

How To Remove Xp Internet Security 2011 Virus Manually

Get Max Internet Security where to buy software for students ]

SIGNiX: Digital Signature Service

Citrix Access Firefox Browser

Manually Remove Of Xp Internet Security Protect Virus Manually

SharePoint Guide for Reviewers

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

COMPUTER HEALTH CHECKLIST

Student Tech Guide. Get Help from the Information and Technology Solutions Center! link.mnsu.edu/studenttech. Big ideas. Real-world thinking.

Presidential Transition Taskforce

Microsoft Office Word 2013

INTERNET SAFETY* GALEN GARRETSON RASCAL MARCH 2-3, * Sources include learnfree.org, PC World, wikpedia.com, techterms.com

Microsoft Office Word 2016 for Mac

Sophos Central Admin. help

Schematic Antivirus 2013 For Windows Xp Sp2 32

Windows Xp User Manual Full Version With Key For Pc

STUDENT ICT ACCEPTABLE USE POLICY

Contents. Getting Started...1. Managing Your Drives...9. Backing Up & Restoring Folders Synchronizing Folders...52

PUPIL ICT ACCEPTABLE USE POLICY

Blackboard Student Guide

D2L Brightspace. The Environment. University Information Technology Services. Learning Technologies, Training, & Audiovisual Outreach

How To Remove A Virus Manually Windows 7 Laptop Using Antivirus Program

Your security on click Jobs

How To Remove Virus Without Antivirus In >>>CLICK HERE<<<


Junos Pulse for Google Android

Staying Safe on the Internet. Mark Schulman

Developing Podcasts with the PC - Level 1

Cyber Security Basics. Presented by Darrel Karbginsky

Using Word 2011 at Kennesaw State University

IT User accounts. IT resources for McGill students. McGill ID ( a 9 digit number) Minerva PIN - (yymmdd) First time login to Minerva

Unable To Uninstall Avira Antivirus Error Code 7

NUIT Tech Talk: Spring Cleaning Remembering the Technology?

Welcome. Password Management & Public Wi-Fi Security. Hosted by: Content by:

How To Turn Off System Restore In Windows 7 Home Premium In Safe Mode

Student Guide to Blackboard

Norton Internet Security 2008 Manual Uninstall Tools

STUDENT ACCEPTABLE USE OF IT SYSTEMS POLICY

Desire2Learn. Student Guide for Mobile Devices. Information Technology Services. Outreach and Distance Learning Technologies

Backing up Your ipad

Transferring Files from Panopto to MediaSpace

FAQ. Safe Anywhere PC 12. Disclaimer:

Avira Ultimate Protection Suite. Short guide

How to reset Internet Explorer

Guide to using Simply Web

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

Instructions for using Citrix to access applications for students in the Department of Mathematics and Statistics.

Creating a Website with Publisher 2016

Computing Resources. at the University of Pittsburgh Tuesday, June 27, 2017

Transcription:

Keeping Your Computer Secure Quick Reference Guide Created: 3/16/2010 Page 1 of 1

Table Of Contents 1. Introduction... 3 2. Keeping Your Computer Up to Date... 4 2.1 Windows... 4 2.2 Mac... 6 3. Malware and Antivirus Protection... 7 3.1 Campus Solution... 7 3.2 Personal Solutions... 8 4. Strong Passwords... 8 4.1 Use a passphrase instead of a password... 8 4.2 Add complexity... 9 4.3 Test your passphrase/password... 9 4.4 Other Tips... 9 4.5 When to Change a Password... 9 5. Creating Backups of Your Files... 9 5.1 Campus Options... 9 5.2 Backup Software... 9 5.3 Commercial Options... 10 6. The Dangers of Wireless Networks... 10 7. Safe Browsing Tips... 10 7.1 Clearing Private Data... 10 8. Peer 2 Peer... 13 9. Phishing and Email Scams... 14 10. Resources... 14 Created: 3/16/2010 Page 2 of 2

1. Introduction Information technology is becoming essential in our everyday lives, including at work, on campus and at home. As such, computer security is becoming increasingly important. This guide is a supplement to the Kennesaw State University Information Technology Services miniworkshop entitled Keeping Your Computer Secure. This Quick Reference is not intended to replace the mini workshop, but instead is intended to supplement and provide a quick reference to the topics covered in the mini workshop. This Quick Reference covers the following topics: Keeping Your Computer Up to Date Malware and Antivirus Protection Strong Passwords Creating Backups of Your Files The Dangers of Wireless Networks Safe Browsing Tips Peer 2 Peer (P2P) Technology Phishing and Email Scams Created: 3/16/2010 Page 3 of 3

2. Keeping Your Computer Up to Date Note: Campus computers are set to download and install critical updates automatically. 2.1 Windows 2.1.1 To update your PC manually 1. In Windows Internet Explorer go to http://update.microsoft.com/windowsupdate/ or click on the Safety menu, then Windows Update. Windows Update may also be located under Tools or Help when using older versions of Internet Explorer. 2. Then, do one of the following: a. Click Express to check for High priority updates. Windows Update will check for High priority updates for your PC and display them for your review. Click Install Updates to install high priority updates. b. Click Custom to check for Optional updates. Windows Update will check for the latest updates for your PC. Created: 3/16/2010 Page 4 of 4

Note: If you click Custom, High priority updates will be presented for your review. Select Optional Updates from the left side of the web page by type: "Software, Optional" or "Hardware, Optional. " Source: http://www.microsoft.com/windows/downloads/windowsupdate/learn/windowsxp.mspx 2.1.2 To turn on Automatic Updates in Windows XP (SP2) 1. Click Start, and then click Control Panel. 2. Double click Automatic Updates. 3. Choose Automatic (recommended). Source: http://www.microsoft.com/windows/downloads/windowsupdate/learn/windowsxp.mspx Created: 3/16/2010 Page 5 of 5

2.2 Mac 2.2.1 Manually getting updates 1. Click on the Apple menu in the upper left corner of your screen. 2. Click Software Update in the drop down menu. 3. Your computer will search for available updates. When it finishes, select the updates you wish to apply and click Install. 2.2.2 Automatically Get Updates 1. Click on the Apple menu in the upper left corner of your screen. 2. Click on System Preferences 3. From the View menu, choose software update 4. Select the interval you would like your computer to check for updates. Created: 3/16/2010 Page 6 of 6

Note: If you are new to Apple computers, ITS Technology Outreach offers an online course as well as downloadable documentation to KSU faculty and staff. Visit http://its.kennesaw.edu/techoutreach/ for information. 3. Malware and Antivirus Protection 3.1 Campus Solution Information Technology Services provides Symantec antivirus protection to faculty, staff and students on the ITS Website at https://its.kennesaw.edu/downloads/. You must use your NetID and password to sign in to download the software. Created: 3/16/2010 Page 7 of 7

The Faculty and Staff downloads include compatibility for both 32bit and 64bit versions of Windows XP, Windows Vista and Windows 7. The Student version is only compatible with 32bit versions of Windows XP. 3.2 Personal Solutions There are a variety of other solutions available that are either free or charge a small fee. Some examples are below: AVG o http://www.avg.com Microsoft Security Essentials o http://www.microsoft.com/security_essentials/ Avast o http://www.avast.com Avira o http://www.avira.com/ ClamAV o http://www.clamav.net/ Note: Running more than one antivirus solution at a time may cause adverse effects. Uninstall your old antivirus solution before installing a new one. Note: If you believe a file might have a virus, you can upload it to http://www.virustotal.com/ or http://virscan.org/ and scan it with various antivirus products. After the scan is complete, either of the websites will tell you if the file is infected and what product detected it. Please note that no single product detects all instances of malware. 4. Strong Passwords 4.1 Use a passphrase instead of a password Passphrases can be much more complex than passwords making them more secure. Example: thetrafficon575washorribletoday Created: 3/16/2010 Page 8 of 8

4.2 Add complexity For a stronger password, use capital and lower case letters, numbers and special characters. For example: password becomes P@$$w012d 4.3 Test your passphrase/password Microsoft s Password Checker: https://www.microsoft.com/protect/fraud/passwords/checker.aspx Note: Keep your password a secret. Information Technology Support Professionals, either on campus or in your personal life, should never need your password. 4.4 Other Tips Keep your password a secret Do not type passwords on computers that you do not trust o Especially passwords to sensitive accounts (i.e. KSU Email, Banking, etc) Use more than one password 4.5 When to Change a Password There are several theories about when you should change your password. Below are just a few options but you should always change your password when you believe it has been compromised and ideally passwords should also be changed regularly. Every 30 / 60 / 90 days KSU User Accounts & Password Policy: Semiannually 5. Creating Backups of Your Files 5.1 Campus Options The I Drive or M Drive https://files.kennesaw.edu USB External Drives USB Thumb Drives CDs / DVDs 5.2 Backup Software Backup And Restore for Windows Time Machine for Mac Created: 3/16/2010 Page 9 of 9

Note: Securely store any media you may use for backups. 5.3 Commercial Options There are several options available for personal backups. However, you should never use personal backup services to store Kennesaw State University data. Doing so violates University policy and may violate several laws. Some of the more reputable services are below: Carbonite o http://www.carbonite.com/ Mozy o http://mozy.com/ MobileMe o http://www.apple.com/mobileme/ DropBox o https://www.dropbox.com/ 6. The Dangers of Wireless Networks Do not trust unencrypted connections. Be leery of free wifi as what you are doing could be seen by someone under the right circumstances. Also, free wifi hotspots might also be malicious in nature (i.e. they may monitor your actions or capture what you type.) Look for the lock either in your browser s address bar windows or at the bottom of the browser to indicate a secure connection. Always be mindful of who is behind you and who can see your screen in a public place. 7. Safe Browsing Tips When possible, use secure connections Use the security features within your browser Clear any private data stored in your browser regularly Avoid using sites that you do not personally trust Lock your workstation whenever you leave it o Windows Press the Windows Key and L 7.1 Clearing Private Data 7.1.1 Internet Explorer Created: 3/16/2010 Page 10 of 10

1. Click Tools > Delete Browsing History 2. Click Delete all 3. Click Yes to confirm that you wish to delete all files from the cache. 4. Close and restart your browser. 7.1.2 Firefox 1. Click Tools > Clear Recent History Created: 3/16/2010 Page 11 of 11

2. In the drop down box, select Everything 3. Click Clear Now 4. Close and restart your browser. 7.1.3 Safari 1. Open Safari 2. In the Safari Menu, select Safari then select Reset Safari Created: 3/16/2010 Page 12 of 12

3. Ensure all of the check boxes are checked then click Reset 8. Peer 2 Peer Peer 2 Peer (P2P) technology presents a great way to share legal materials in a distributed fashion but this technology is easily abused for illegal purposes. Illegal copies of music, videos, software, etc can contain malware and violate the owners copy right protection. Malicious material may cause irreparable harm to your computer and data. Violating copy right law can result in result in fines and other legal action. Created: 3/16/2010 Page 13 of 13

9. Phishing and Email Scams Avoid clicking on links in emails, instead type the address in manually Avoid opening unexpected attachments or attachments from unexpected senders Verify contact information for someone before trusting it If it sounds suspicious or to good to be true, then it probably is ITS will never ask for your password or other personal information via email When in doubt about the validity of an email or communication, contact the KSU Service Desk http://www.microsoft.com/protect/fraud/phishing/symptoms.aspx 10. Resources UITS Website o Main Website: http://uits.kennesaw.edu/ Faculty and Staff Service Desk o service@kennesaw.edu o 470 578 6999 Student Service Desk o studenthelpdesk@kennesaw.edu o 470-578- 3555 Anonymously Report Computer Abuse o http://www.kennesaw.edu/infosec/abuse.html o abuse@kennesaw.edu Created: 3/16/2010 Page 14 of 14