Best Practices

Update your Software.

When you update your Operating System (OS) or your application software, it also updates the security features that keep you protected from malicious attacks.

     Keeping Windows up to date 

Make sure your firewall is enabled.

  • A firewall is important in preventing malicious software from being transmitted to your computer via the internet or any other network.
  • For more information visit: us-cert.gov.

Antivirus

  • Making sure you have an Antivirus installed and updated is essential to maintaining your data integrity.
  • It is critical to keep your Antivirus updated in order for it to stay current with the latest virus definitions.
  • If you do not have an Antivirus installed, please visit our toolsmenu to download one.

Password Management

  • Be sure to have a unique password that contains at least six mixed-cased alphabetic characters, numerals, and special characters.
  • Choose a password that is difficult, but easy for you to remember so you do not have to write it down.
  • Common passwords to avoid: 123456, 12345, 123456789 (any numerical sequence), password, abc123, asdfg, password1, qwerty, abcdefg, etc.

Mobile Security

  • Set up a screen lock passcode/password on your device to provide a "first line of defense" to an intruder.
  • Install or enable software to remotely track your device.  Consider enabling a remote wipe feature to protect your data in case your stolen device cannot be recovered.
  • Update your device and enable automatic updating so it is always running the latest version of the operating system.  Most, if not all updates, have security patches that fixes vulnerabilities.
  • Only download apps you need from trusted sources such as iTunes, Google Play, or Amazon App Store.
  • Backup your data to a trusted source.
  • Be discreet with your mobile device in highly public or crowded areas; it is difficult for someone to steal something if they don't know it's there.

Open trusted emails only

  • If you do not recognize the sender of an email, call the sender to verify its legitimacy.
  • Report any unverified/malicious emails to the Computer Services Center immediately.