Which of the following is the best practice for securing your home computer?
Don't ever say, "It won't happen to me." We are all at risk and the stakes are high - both for your personal and financial well-being and for the university's standing and reputation. Show
Tip #2 - Keep software up-to-dateInstalling software updates for your operating system and programs is critical. Always install the latest security updates for your devices:
Tip #3 - Avoid Phishing scams - beware of suspicious emails and phone callsPhishing scams are a constant threat - using various social engineering ploys, cyber-criminals will attempt to trick you into divulging personal information such as your login ID and password, banking or credit card information.
Check out our Phishing Resources section for details about identifying phishing scams and protecting yourself. Tip #4 - Practice good password managementWe all have too many passwords to manage - and it's easy to take short-cuts, like reusing the same password. A password manager can help you to maintain strong unique passwords for all of your accounts. These programs can generate strong passwords for you, enter credentials automatically, and remind you to update your passwords periodically. UC Berkeley offers free LastPass Premium to all users with a CalNet ID. Our Protecting Your Credentials how-to article contains detailed recommendations for keeping your password safe. Tip #5 - Be careful what you clickAvoid visiting unknown websites or downloading software from untrusted sources. These sites often host malware that will automatically install (often silently) and compromise your computer. If attachments or links in the email are unexpected or suspicious for any reason, don't click on it. ISO recommends using Click-to-Play or NoScript, browser add-on features that prevent the automatic download of plug-in content (e.g., Java, Flash) and scripts that can harbor malicious code. Tip #6 - Never leave devices unattendedThe physical security of your devices is just as important as their technical security.
Tip #7 - Safeguard Protected DataBe aware of Protected Data that you come into contact with and its associated restrictions. Review the UCB Data Classification Standard to understand data protection level requirements. In general:
Unsure of how to store or handle sensitive data? Email us at [email protected]. Tip #8 - Use mobile devices safelyConsidering how much we rely on our mobile devices and how susceptible they are to attack, you'll want to make sure you are protected:
Tip #9 - Install antivirus/anti-malware protectionOnly install these programs from a known and trusted source. Keep virus definitions, engines and software up-to-date to ensure your programs remains effective. See our Minimum Security Standards Anti-Malware Software Guidelines for more information Tip #10 - Back up your dataBack up regularly - if you are a victim of a security incident, the only guaranteed way to repair your computer is to erase and re-install the system. Which of the following is a best practice for securing your home computer Cyber Awareness 2022?Which of the following is a best practice for securing your home computer? -Create separate accounts for each user.
Which is a best practice for securing your home computer?Tips to protect your computer. Use a firewall. ... . Keep all software up to date. ... . Use antivirus software and keep it current. ... . Make sure your passwords are well-chosen and protected. ... . Don't open suspicious attachments or click unusual links in messages. ... . Browse the web safely. ... . Stay away from pirated material.. Which of the following is a security best practice for protecting personally identifiable information PII cyber awareness?Additionally, organizations establishing procedures for access control can prevent inadvertent disclosure of PII. Other best practices include using strong encryption, secure passwords, and two-factor (2FA) and multifactor authentication (MFA).
What is a good practice that helps keep laptop secure quizlet?The best protection against physical theft is to secure the laptops in place using a cable lock. Requiring strong passwords or using encryption might prevent unauthorized users from accessing data on the laptops, but does not prevent physical theft.
|