Top 10 Computer Security Mistakes Made by Individuals

Document Sample
Top 10 Computer Security Mistakes Made by Individuals Powered By Docstoc
					                Top 10 Computer Security
               Mistakes Made by Individuals
1.     Passwords on Post-it Notes

     The ubiquitous Post-It Note appears to be a major crippler of security
     measures. Leaving a note with your valid password written on it posted
     near your computer monitor is the most frequent violation of information
     security policy. Some experts say one out of five employees is guilty.
     It’s too easy for someone to copy it down and gain legitimate access to
     your systems with your password. It’s the equivalent of identity theft.
     Toss those notes into the shredder and change your password now.

2.     Leaving Your Computer Unattended

     Too many people simply leave their computers on and walk away to do
     other things. Didn’t your parents teach you to turn off the lights? The
     point isn’t to save energy. It’s to save Humber from a potentially costly
     and embarrassing computer breach.         Even the best passwords are
     worthless if someone can access your systems while you are absent.

3.     Opening E-mail Attachments from Strangers

     Believe it or not, the “Love Bug” virus cost business billions of dollars
     worldwide. There is no substitute for looking before you leap and open
     any e-mail. There’s a reason why these types of cyber attacks are so
     successful: trust and curiosity in human nature can be easily abused.
     Don’t let it be you unknowingly spreading the latest computer virus.

4.     Poor Password Etiquette

     Everyone should take a quick course in password etiquette. Don’t let
     your default password remain as your primary password. Do not enter
     the same password you have always had when the system asks you to
     change your password. Be original; think of your own combination of
     letters and numbers. Remember, the longer the better.




                   (416) 675-6622 X8888 (X4786 from Residence)
                http://its.humber.ca  ITCustomerCare@humber.ca
5.      Laptops on the Loose

     While theft of a laptop computer that’s loaded with company secrets can
     happen in the airport, it’s just as likely to happen from your office
     overnight. Lock the laptop in a desk drawer, out of sight, to minimize the
     risk or the temptation for it to walk.

6.      Blabber Mouths

     Talking about your passwords, or about confidential information over
     lunch, in the break room, after work, in a public drinking spot, or at the
     gym only increases the risk of someone gaining access to information
     they are not authorized to have. Not everyone needs to know.

7.      Plug and Play without Care

     In the rush to get things going, too many folks bypass routers and
     firewalls and connect home computers straight into the Internet. Spend
     the time and money to do it right to avoid all the fallout later.

8.      Not Reporting Security Violations

     You may be vaguely aware of Humber security policies, but it’s important
     to know what’s acceptable and what’s not. And you have to be willing to
     report a breach of security if you observe it in another individual. It’s no
     time to worry about being a tattletale. Humber’s success depends on
     prompt action to avert or respond to an incident.

9.      Always Behind the Times (The Patch Procrastinator)

     One of the biggest vulnerabilities of any home computer system is the
     failure to install updates and patches for deployed software. Updates
     often close loopholes that may exist. Ignoring them or putting them off
     for another day could cost you and Humber dearly.

10.     Keeping an Eye on the Organization

     While most managers believe an information security breach will come
     from an outside intruder, they are wrong. The biggest risk comes from


                   (416) 675-6622 X8888 (X4786 from Residence)                 2
                http://its.humber.ca  ITCustomerCare@humber.ca

                                    Page 2 of 3
within. Disgruntled students, laid-off employees, a less than ethical
contractor, or an employee playing both sides of the fence are all
potential threats. Every employee has to be responsible for themselves
and the behaviour they observe in others. “Only you can prevent security
incidents,” says Smokey the anti-hacker.


                                             Source: http://humanfirewall.org
                                       Developed by the Technical Service Desk
                                                 Last Revised on May 18, 2007




              (416) 675-6622 X8888 (X4786 from Residence)                   3
           http://its.humber.ca  ITCustomerCare@humber.ca

                             Page 3 of 3

				
DOCUMENT INFO