This web page provides tips for mitigating technology-related risks while getting the most out of your computing environment by addressing personal security practices and offering suggestions related to passwords and email attachments.
To Protect Your Password
Please see our Password Tips and Best Practices page for any information regarding password security tips, best password practices, before and after changing your password, and troubleshooting password issues.
Even though a number of methods are used to protect you from becoming infected, new virus threats continue to be an issue, particularly with email attachments. The IUP email server blocks some attachment types (see Email Attachment Filtering) that are known to spread viruses. You should still exercise extreme caution when receiving email with attachments, even from people you know. Most viruses “spoof” or “fake” the sender’s email address, making it look like the message is from someone you know. If you weren’t expecting an attachment, consult with the sender before opening it, or simply delete it. When in doubt, don’t open it.
Other Safety Measures
One other step in keeping your office computer safe is logging off each day, but leaving your PC on so that it receives any necessary security patches or virus updates during the overnight hours.
Also, if you are going to be away from your computer, you can lock it to prevent someone else from using your account. In Windows, you can lock your computer by pressing Ctrl-Alt-Del simultaneously, and click on “Lock Computer.” You can unlock it when
you return by pressing Ctrl-Alt-Del again and entering the password you used to log on to the computer.
You can also use the Windows screen saver to lock your computer automatically after a period of inactivity. To do this:
More Information on PC Security Practices
The US Computer Emergency Response Team offers extremely valuable information regarding PC security practices. Please take a moment to review these US-Cert websites to aid in protecting your PC and yourself.
Cyber Security Tip ST04-002
Cyber Security Tip ST04-003