Use Strong Passwords; Write Them Down or Use an Encrypted Password Database. Consider Using Two-Factor Authentication Instead of Passwords.  
  Use Anti-Virus and Anti-Spyware Software.  
  Protect Against Internet Intrusions.  
  Regularly Check For and Apply Security Updates.  
  Routinely Back Up Your Data, and Verify You Can Restore From the Backup.  
  Apply Common Sense When Dealing with E-mail.  
  Be Aware of the Risks of File-Sharing.  
  Routinely Check for Suspicious Activity.  
  Educate Your Employees About Your Security and Acceptable Use Policies.  
  Develop and Continually Refine a Disaster Recovery / Business Continuity Plan.  
  Limit Access to Sensitive and Confidential Data.  
Home About Me Contact Support BLive To Me! Monthly Specials
 
 



Apply Common Sense When Dealing with E-mail.



Why bother doing this? E-mail attachments have replaced floppy disks as the primary source of virus infections. E-mail is also one of the main tools used in "phishing" schemes to deceive consumers into providing personal data, including credit card numbers, etc.  For more about these "Phishing" scams, click here to read one of the Federal Trade Commission Consumer Alerts.


Install and use spam-filtering software or managed services.

  Some of the subject lines for spam messages you receive may seem like legitimate correspondence that you should open ("re: your invoice" or "order confirmation"), or imply a sense of urgency ("limited time offer"), while others should be dead give-aways ("meet singles in your area" or "enlarge your ...").

  Resist the temptation to open such messages, since doing so could send a confirmation to the spammer that your email address is active.


Avoid opening any email attachments from unknown or questionable sources.

   If you do not recognize the sender's address, or the subject does make sense coming from someone you might know, it is safer to delete the message without opening it.


Be suspicious of any unexpected email attachments even if it appears to be from someone you know

   For example, a message with an attachment received in reply to a message you never sent.

   Remember:  Microsoft never distributes software updates via e-mail. If you receive an e-mail that claims to contain software from Microsoft, do not run the attachment.


Be suspicious of urgent demands for information.

  For example, a message may claim that your account will be terminated if you fail to immediately confirm, verify or authenticate your personal information.

  Do not believe any email that asks you to "confirm" your credit card, bank account, or internet service provider information by clicking on a convenient link in the message.






Avoid clicking on links in any email if the content of the email is suspicious or unfamiliar.

   For example, a message advising you of some "problem" with your bank or credit card account and which asks you to click on a "button" provided in the message to "update" your password and account information. This is a common "phishing" technique.

  Sometimes but not always, the e-mail will contain spelling or grammar errors, or will phrase something in a way that would rarely appear in standard English business letters.

   Click here if you would like to see some examples of actual phishing emails that have been submitted to the Anti-Phishing Working Group.

Next...

top

 
  Copyright 2005 Duke InfoSecurity & InfoTechnology Services. All rights reserved
PRIVACY POLICY                    Terms of Services & Legal Notices