Use Strong Passwords; Write Them Down or Use an Encrypted Password Database. Consider Using Two-Factor Authentication Instead of Passwords.  
  Use Anti-Virus and Anti-Spyware Software.  
  Protect Against Internet Intrusions.  
  Regularly Check For and Apply Security Updates.  
  Routinely Back Up Your Data, and Verify You Can Restore From the Backup.  
  Apply Common Sense When Dealing with E-mail.  
  Be Aware of the Risks of File-Sharing.  
  Routinely Check for Suspicious Activity.  
  Educate Your Employees About Your Security and Acceptable Use Policies.  
  Develop and Continually Refine a Disaster Recovery / Business Continuity Plan.  
  Limit Access to Sensitive and Confidential Data.  
Home About Me Contact Support BLive To Me! Monthly Specials
 
 



Regularly Check For and Apply Security Updates


Why bother doing this?  The time interval between the release of a software or operating system update to correct a vulnerability and the appearance of malware that exploits that vulnerability is constantly shrinking: a few years ago it was measured in weeks, now it is measured in days, and soon it may be measured in just hours.


Ensure security updates for your operating systems and applications are up-to-date and are regularly updated.


Most major software companies release updates which address security, performance, and usability issues.

  Generally, these should be applied to your computers soon after they are made available:  most malicious software ("malware") exploit vulnerabilities that are already known and for which patches or updates have already been released.


Ensure that you are getting your updates from a trusted source.

  Exercise extreme care when clicking on a link received via email:  this may take you to a bogus update site rather than to the legitimate vendor site.  Carefully compare the text of the URL in the email with the URL that appears when you hover the mouse over the link, or if that is not possible, attempt to copy the link and paste it into a text editor so that you can examine the URL address before actually connecting to the site.

  Do not install an "update" received as an attachment to an email:  reputable software vendors rarely distribute their updates in this manner, and Microsoft never distributes updates as email attachments.

Next...

top

 
  Copyright 2005 Duke InfoSecurity & InfoTechnology Services. All rights reserved
PRIVACY POLICY                    Terms of Services & Legal Notices