Protecting Your Assets

Download Report

Transcript Protecting Your Assets

TECHNOLOGY GUIDE FIVE
Protecting Your Information Assets
Behavioral Actions

Do not provide personal information to strangers in any
format


Credit Cards




Protect your social security number
Use credit cards with your picture on them
Use virtual credit cards
Know your credit card billing cycles
Limit use of debit cards
Behavioral Actions (continued)



Do not use a personal mailbox at home or at an
apartment
Use a cross-cut (confetti) shredder
Sign up with a company that provides proactive
protection of your personal information
Computer-Based Actions




Never open unrequested attachments to e-mail files, even
those from people you know and trust.
Never open attachments or Web links in e-mails from
people you do not know.
Never accept files transferred to you during Internet chat
or instant messaging sessions.
Never download any files or software over the Internet
from Web site that you do not know.
Computer-Based Actions





(continued)
Never download files or software that you have not
requested.
Test your system.
Run free malware scans on your computer.
Have an anti-malware product on your computer and use
it (ideally at least once per week).
Have a firewall on your computer.
Computer-Based Actions





(continued)
antispyware product on your computer.
rootkit detection product on your computer.
monitoring software on your computer.
content filtering software on your computer.
antispam software on your computer.
Computer-Based Actions






(continued)
Have proactive intrusion detection and prevention
software on your computer.
Manage patches.
Use a browser other than Internet Explorer.
Travel with a “sterile” laptop or no laptop.
Use two-factor authentication.
Use encryption.
Computer-Based Actions





(continued)
User laptop tracing tools or device reset/remote kill
tools.
Turn off peer-to-peer (P2P) file sharing.
Look for new and unusual files.
Detect fake web sites.
Use strong passwords.
Computer-Based Actions





(continued)
Adjust privacy settings on your computer.
Surf the Web anonymously.
E-mail anonymously.
Erase your Google search history.
Personal disaster preparation: backup, backup,
backup!

Carbonite
Wireless Security






Hide your Service Set Identifier (SSID)
Use encryption.
Filter out media access control (MAC) addresses
Limit Internet Protocol (IP) addresses.
Sniff out intruders.
Change the default administrator password on your
wireless router to something not easily guessed
Wireless Security (continued)




Use virtual private networking (VPN) technology to
connect to your organization’s network.
Use Remote Desktop to connect to a computer that is
running at your home.
Configure windows firewall to be “on with no
exceptions.”
Only use Web sites that use Secure Sockets Layer (SSL)
for any financial or personal transactions Use wireless
security programs.