Essential Security Measures
Essential Security Measures
Essential Security Measures
Make backup copies of files or data you are not willing to lose -- and store the
copies very securely.
To back up your files:
Check with the ITS Support Center or your ITS Divisional Liaison to find out if
there are regular backups of your department's computers.
Make copies of critical and essential files on a daily basis and non-critical files on
a weekly or monthly basis.
Don't forget about mobile devices! Synch or back these up regularly, too.
Don't download plugins to view pictures, videos, music and other content online
without verifying their legitimacy. These often contain malware.
Don't click on links or ads for software in email, popups, instant messages/texts,
or social networking sites such as Facebook and Twitter.
Don't open unsolicited attachments. If in doubt, contact the sender and ask if the
attachment is legitimate.
Don't use untrusted portable media, such as a stranger's flash drive. If the flash
drive is infected, it will infect your computer.
Never deactivate your computer's antivirus or other protective software. Set them
to update frequently and automatically.
Shut down, lock, log off, start screensaver, or put your device to sleep before
leaving it unattended
o
Set your device to "lock," "sleep," "auto log-off", or go to screensaver when you're
not using it (max. 20 minutes of inactivity).
Make sure you have to enter a strong password to start up or wake-up your
computer.
Physical Security
Why is physical security important?
To help prevent theft, loss, and unauthorized access
Secure laptop computers and mobile devices at all times: keep them with you or
lock them up securely before you step away -- even just for a second. And make
sure they are locked to or in something permanent.
o
Use a paper shredder or secure shred bin when throwing out personal or
sensitive information.
Be sure to lock up portable equipment and sensitive material before you leave
them unattended -- or take them with you.
Secure your area before leaving it unattended: take keys out of drawers, close
and lock windows, never share your access code, card or key, and don't hold secure
doors open for people you don't know.
Set up your workstation so that unauthorized people and passers-by cannot see
sensitive information on your monitor.
Securely delete all contents of computers and mobile devices, before discarding,
exchanging, selling or donating them.
Report lost or stolen devices to the police. If the device contained sensitive
UCSC information or passwords, also report it to the ITS Support Center (contact
info below). Additional reporting information
Immediately change all passwords used or stored on the device.
See ITS' Mobile Devices and Wireless page for information about prevention in
case of theft or loss, and a checklist for lost or stolen mobile devices.
Web servers, file servers, FTP servers, email and proxy servers
Open ports
Allowing others open access to your computer and your files (this includes guest
accounts, which shold be disabled)
The more services that are running on your computer, the more opportunities
there are for others to use them, break into or take control of your computer through
them.
They don't allow anonymous access or guest access to your computer or files
unless there is a specific business need to do so (this is normally controlled with file
sharing settings)
---