Computer Security Checklist

Computer security involves safeguarding computing resources, ensuring data integrity, limiting access to authorized users, and maintaining data confidentiality. Effective computer security, therefore, involves taking physical security measures (to ensure hardware and media are not stolen or damaged), minimising the risk and implications of error, failure or loss (for example by developing a resilient backup strategy), appropriate user authentication (for example by employing strong passwording), and possibly the encryption of sensitive files.

We live in a world where “information wants to be free” and in which people are getting used to having access to whatever information they want anytime, anywhere and from a wider and wider range of computing devices. Unfortunately, in terms of the security and control of the resources to which computers permit access, this can prove quite a problem. Indeed, many users unfortunately often view security and control measures as inhibitors to effective computer use.

Below are 10 computer security checklist

  1. Patch, Patch, PATCH!
    Set up your computer for automatic software and operating system updates. An unpatched machine is more likely to have software vulnerabilities that can be exploited.
  2. Install protective software.
    Sophos is available as a free download for Windows, Mac, and Linux from. When installed, the software should be set to scan your files and update your virus definitions on a regular basis.
  3. Choose strong passwords.
    Strong passwords use a combination of letters, numbers, and special characters to create a mental image or an acronym that is easy for you to remember. Create a different password for each important account, and change passwords regularly. LastPass can manage all of your passwords for you — and it’s free!
  4. BACK UP on a regular basis!
    Regular, scheduled backups can protect you from the unexpected. Keep a few months’ worth of backups and make sure the files can be retrieved if needed. Download and install CrashPlan and learn how to back up your system.
  5. Control access to your machine.
    Don’t leave your computer in an unsecured area, or unattended and logged on, especially in public places. This includes Athena clusters and Quickstations. The physical security of your machine is just as important as its technical security.
  6. Use email and the internet safely.
    Ignore unsolicited emails, and be wary of attachments, links, and forms in emails that come from people you don’t know, or which seem “phishy.” Avoid untrustworthy (often free) downloads from freeware or shareware sites. Learn more about spam filtering.
  7. Use secure connections.When connected to the internet, your data can be vulnerable while in transit. Use remote connectivity and secure file transfer options when off campus.
  8. Protect sensitive data.
    Reduce the risk of identity theft. Securely remove sensitive data files from your hard drive, which is also recommended when recycling or repurposing your computer. Use the encryption tools built into your operating system to protect sensitive files.
  9. Use desktop firewalls.
    Mac and Windows computers have basic desktop firewalls as part of their operating systems. When set up properly, these firewalls protect your computer files from being scanned.
  10. Most importantly, stay informed.
    Stay current with the latest developments for your operating systems.

Leave a Reply

Your email address will not be published. Required fields are marked *