Protection of Personal Computer Best Practices for General User
|
|
- Josephine Fitzgerald
- 8 years ago
- Views:
Transcription
1 Protection of Personal Computer Best Practices for General User ccording to the Government survey conducted in , over 80% of Hong Kong households own a computer. Thanks to the extensive broadband network of the city, Internet connection has never been this accessible, whether at work or at home. With just a few clicks, we can make the most out of the multimedia device for business, education or entertainment purposes. In recent years, it has become a common practice for computer vendors to offer university students and staff special discounts for purchasing personal computer. The computers sold usually contain the most updated operating system and software, including antivirus, while some of them use cloud platform such as Office 365 and Adobe Cloud. With connections to both the Internet and school Intranet, students and staff are well equipped to complete the tasks at hand with abundant resources. While computers continue to occupy a central role in daily assignment and work, users must be aware of the potential IT security threats posed to their personal computers. The following paragraphs will introduce eight essential protection areas for users to secure usage of their personal computers. 1 Cookies and Plug in Software vulnerability is not limited to software installed on top of the operating system, Internet browser is another security concern that user should be aware of. Cookies 2 It is a small piece of data that helps browser to track user behaviour and the websites that user visited. Even though cookies itself does not contain malware or carry any virus, it still raises concern about user privacy. Authentication cookies issued by websites may subject user to potential Man in the middle attack. Hackers can easily access the website using the victim s personal information with the help of cookies and fish for financial gain. Unlike their counterparts in commercial sector, users personal computers are generally not wellmanaged as most of them lack centralized services, such as Active Directory from Microsoft, to monitor and maintain their well beings. For example, without regular system health check, personal computers may be exposed to the latest vulnerabilities if the patch level is not up to date. Therefore, the protection of personal computers, though neglected at times, should be made the top priority for any computer users. Figure 1 The statistics of browser plug in vulnerabilities 3 Page 1
2 Cookies Removal 4 : Although cookies may not pose any threat to our software, it could expose user privacy, such as user login ID, password and other Internet surfing hobbies. Users may find the following instructions useful if they wish to remove cookies. For Mozilla FireFox version or above: 1. Select Tools, Options of FireFox pull down menu. 2. In the page of Options, click Privacy tab. 3. At Privacy section, click Show Cookies button, click Remove All. Plug in 5 It is a software component that adds a specific feature to an existing software application. The most common plug in is web browser plug in such as Adobe Flash player, Apple QuickTime player and Oracle Java. The most crucial browser plug ins are Microsoft Active X, Adobe Flash and Oracle Java, users should update the plugin in from Microsoft, Adobe and Oracle when prompted. Do not accept any update request of Active X, Flash and Java from untrustworthy websites. User should be careful when opening unsolicited attachments from message, the usage of anti spyware software is also appropriated for the protection and scanning of incoming documents, not just only from the web site. ATTENTION: As user may be using browser of different versions, the steps explained below may be slightly different: Figure 3 Mozilla FireFox cookies setting For Apple Safari version 5 or above: 1. Select Gears menu in the upper right corner of the Safari window. 2. Click Reset Safari. 3. Check the last item, Remove all website data and uncheck the remaining items if you would like to remove cookies only. For Google Chrome version 14 or above: 1. Select Options from the wrench button in the upper right corner of the Chrome window. 2. In the page of Options, click Under the Hood. 3. At Privacy section, click Content Settings. 4. At Cookies section, click All Cookies and Site Data. 5. Click Remove All button to delete all cookies. Figure 4 Safari cookies setting For Microsoft Internet Explorer, the latest version is highly recommended: Figure 2 Google Chrome setting about Cookies 1. Select the menu from top right corner of the browser window, choose Internet Option (This is also available from Control Panel). 2. Select the General tab from the Option window Page 2
3 3. Click Delete under Browsing History 4. Select Cookies and Website Data, click Delete For Mozilla FireFox, choose Tools, Add ons to select which Add on (plug in) would like to disable (deactivate): Figure 7 Mozilla FireFox Add on setting Figure 5 Internet Explorer browsing history setting Browser Plug in Management 6 : Different from cookies, plug in works as part of the browser application. Plug in sometimes not only slows down the Internet browsing speed but also introduces security holes, especially to Java. User can disable any plug in which is no longer used or one that poses security concern. For Google Chrome, click the top right corner option, and choose Extensions, a list of extensions (plug in) can be disabled by unchecking the boxes or even removing the extensions: For Apple Safari, the setting page can be found in Preferences page. Safari does not install any Extensions (plug in) by default. To disable all extensions, simply check the OFF button as shown below: Figure 8 Safari extension switch For Internet Explorer, select Programs tab from Internet Option window, choose Manage add ons. A list of installed plug in is shown in Manage addons window, user can right click specific plug in to choose either Enable or Disable: Figure 6 Google Chrome extensions setting Figure 9 Internet Explorer add on setting Page 3
4 2 Software Patching Patch is a small program that not only fixes security vulnerability but also improves software usability and performance. Patch update is a MUST for keeping operating system and software at an up todate security level, regardless of the operating system and software employed. Office 2007 or above, signature based antivirus software such as McAfee, Norton 360, all need to be updated regularly. For Windows, users can check the default settings of Windows Update and make sure it will download the latest patch from official Microsoft and install them automatically. How does patch secure our computer? 7 Figure 10 Patch Cycle New patch is available for handling new threat throughout regular audit process. After comprehensive testing, deployment and review, operating system and application are deemed to be secure against malware attack. This audit cycle will then come to a halt when a new version of operating system or application is released. The update behaviour for both operating system and applications should be configured automatically. Users should neither ignore the update notification messages from software vendor nor disable the update function. During the patch update process, for example like Windows Update, users can still use the computer as usual, but reboot is required for the changes to take place. Users should make sure that current files are saved before clicking the reboot button. What kind of operating system and application needs patching? Windows from Microsoft, Mac OSX from Apple, UNIX, and Linux, including CentOS or RedHat, all require regular patching. Applications such as Adobe Reader, Flash, Shockwave, Microsoft Figure 11 The default settings of Windows Update is Install updates automatically (recommended) 3 Computer Update While hardware update such as BIOS update rarely happen, the release aims at fixing certain critical vulnerability or hardware fault. Users need to ensure that all data has been backed up and AC power connected before performing update of this kind. Now most of the computers will only allow user to update the BIOS when it is AC plugged in, other hardware updates are mainly driver driven, that means new driver for specific hardware is released for hardware vulnerability fix. Users should pay attention to the source of driver update it should be downloaded only from the official website from the hardware vendor, such as Lenovo. Page 4
5 4 Antivirus Signature Update Antivirus update is essential because it enables the system to block any known attack. Therefore, users should follow the update instruction when it is prompted. Most of the well known antivirus programs are now bundled with firewall, which is another defensive setting that prevents remote attack, users MUST NOT DISABLE it. User can check and update the antivirus manually but the software will perform the update automatically. Figure 12 is an example of Norton Security setting for user reference. 5 Password Management Password functions as the key to open the door. A good password practice can help prevent unauthorized accesses of the computer system. Below are best practices for users to strengthen password protection: 1) create a strong password, 2) do not share the password, 3) change the password regularly, 4) do not configure accounts without password protection. Users may also consider using a password manager software to store their passwords securely and retrieve them when necessary. Users can refer to a previous JUCC newsletter for more details about best practices of password management. 8 Signature is out dated. Click Live Update for signature update. 6 Spyware or Malware Awareness Whenever connected to the Internet, a computer can become the target of all forms of remote attacks. Users should be wary of the suspicious website links (URLs) received via system and instant messaging applications such as Skype, and never set the browser to accept cookies automatically. Most of the antivirus programs should be able to detect if a website link is safe to browse or if it contains malicious code. 7 Regular System Backup Updating is in progress. Update is completed. Figure 12 Norton Security update process The main objective for system backup is to resume the operating system functions when it accidentally crashes, or when it does not boot normally after certain patches are applied. System backup is different from backing up files and folders in the way that system backup crones an image of the entire operating system and application environment for recovery purpose. This task may take longer time to complete, depending on the number of applications installed Page 5
6 and the operating system patching level. Users are highly recommended to perform system backup when the computer is idle with minimum activities to speed up the process. Under Windows operating system, users can choose to create a system image under the backup and restore control panel item. 8 Software Download and Installation There are all kinds of software and freeware available on the Internet. However, users must be cautious and select carefully before installing them. Users should always verify the source of the downloaded files only downloads from official website is highly recommended. Also, users should make sure the operating system is compatible with the programs. Essential Security Checklist For the daily usage of personal computer, users should perform essential security checking to ensure that the computer system is secure. The checklist focuses not only on system setting but also computing habits among users. Healthy computing habits include turning off Bluetooth and WiFi when unnecessary, enabling Pop blocker in browser and disabling of widgets. Users should always make sure that the firewall and antivirus software are both up to date. One crucial habit always ignored by users is the regular cleaning of touch screen and keyboard, this can reduce the risk of password guessing by fingerprint trace. Users should also bear in mind the reliability of website: never download and install any fonts or freeware from untrusted site as mentioned earlier in this article. Also, when a computer is left idle, it is better to lock the screen with password. In addition, the free space in the computer system is important not only from the functional point of view, but it is also a security concern as malicious software can take up a lot of available space in the system. There is no standard answer for the recommended percentage of free space storage, as different operating systems have different disk space requirement. Another important checkpoint is the DNS server setting of the personal computer. DNS server information is provided by an Internet Service Provider (ISP) when the Internet connection is made. The illustrations below show the steps to check DNS server setting on Windows platform: Type Command at Windows Start Menu: Figure 13 Windows command prompt starting Then key the following command at Command Prompt: IPCONFIG /ALL It shows the existing IP address and DNS servers setting which may change when another network is connected: Figure 14 DNS setting The abnormal changing of DNS server setting can imply several security risks 9, like users being diverted from the real banking site to the fake one (Refer to Figure 15). Users should check and make sure the DNS server settings are correct when using different networks (school, home and café free WiFi). Page 6
7 When DNS functions normally Internet When DNS hijacking happen... Internet bank.com Figure 15 Illustration of DNS Hijacking To sum up, users should always be aware of insecure practices and software which can cause harm to the system via the Internet connection. The table shown below is the essential security checklist for personal computer users. Item To do List Checklist 1 Disable widgets when not in use 2 Keep certain amount of disk space free 3 Check DNS server settings 4 Turn off Bluetooth or WiFi when not in use 5 Turn on Pop blocker from Internet browser 6 Do not install software or fonts from insecure web site 7 Enable built in Firewall 8 Use reliable anti virus software and update it when prompted 9 Lock the computer with password protected when it is left idle 10 Clean keyboard and touch screen regularly BEST PRACTICE The computer protection methodologies mentioned here are required by the usage of privilege account Administrators group account from Windows. If the daily usage of computer system does not require any software installation and update, users are highly recommended to set up and use a non privilege account ( Power User in Windows) instead. Security Incidents Affecting Personal Computers How system vulnerability can affects our lives? Users can draw a lesson from the examples below: Cybertheft Incident 10 Former Secretary for Security Regina Ip Lau Suk yee became one of the victims of Internet scam earlier this year, as her account was hacked and about HK$500,000 was transferred from her Swiss bank account. Although the bank stopped such transfer, Ip s story reiterates the importance of constant vigilance against cyber security threat. Unsecured devices open to attack! 11 In March 2015, a group of self described security amateur discovered hundreds of devices connected to the Internet without any password protection. These devices, ranging from cameras to industrial control systems, are easy targets for exploitation as they can be easily turned on and off by a single click of mouse. Patch Adobe Flash now! 12 Also at the same month, Adobe released a critical security patch for Flash Player browser plug in for users of Windows, Mac OSX and Linux system. Although there has been no reports of the flaws fixed being targeted, it is believed that hackers are prone attacking users who do not perform a timely update. Page 7
8 References 1. HKSAR Thematic Household Survey Report No. 50 January PDF. 20 April Wikpedia HTTP cookie Web. 20 April Symantec Vulnerability Trends Web. 20 April PCWorld How to Delete Cookies 2 November 2011 Web. 20 April Wikpedia Plug in (computing) Web. 20 April How To Geek How to View and Disable Installed Plug ins in Any Browser Web. 20 April Wikpedia PatchMgmt Web. 20 April Password Management Best Practice for General User Web. 6 May Wikipedia DNS spoofing, Wikipedia DNS hijacking Web. 6 May News100 Hong Kong lawmaker Regina Ip falls victim to HK$500,000 cybertheft 5 May Web. 20 April ComputerWorld IoT s dark side: Hundreds of unsecured devices open to attack 6 June Web. 20 April Patch Flash now: Google Project Zero, Intel and pals school Adobe on security Mar Web. 20 April 2015 Copyright Statement All material in this document is, unless otherwise stated, the property of the Joint Universities Computer Centre ( JUCC ). Copyright and other intellectual property laws protect these materials. Reproduction or retransmission of the materials, in whole or in part, in any manner, without the prior written consent of the copyright holder, is a violation of copyright law. A single copy of the materials available through this document may be made, solely for personal, non commercial use. Individuals must preserve any copyright or other notices contained in or associated with them. Users may not distribute such copies to others, whether or not in electronic form, whether or not for a charge or other consideration, without prior written consent of the copyright holder of the materials. Contact information for requests for permission to reproduce or distribute materials available through this document are listed below: copyright@jucc.edu.hk Joint Universities Computer Centre Limited (JUCC) c/o Information Technology Services The University of Hong Kong Pokfulam Road, Hong Kong Page 8
Quick Start Guide to Logging in to Online Banking
Quick Start Guide to Logging in to Online Banking Log In to Internet Banking: Note: The first time you log in you are required to use your Customer ID. Your Customer ID is the primary account holder s
More informationPhishing Scams Security Update Best Practices for General User
Phishing Scams Security Update Best Practices for General User hishing refers to the malicious attack Pmethod by attackers who imitate legitimate companies in sending emails in order to entice people to
More informationCountermeasures against Spyware
(2) Countermeasures against Spyware Are you sure your computer is not infected with Spyware? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Spyware?
More informationCertified Secure Computer User
Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the
More informationInstructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app
Instructions for Configuring Your Browser Settings and Online Security FAQ s ios8 Settings for iphone and ipad app General Settings The following browser settings and plug-ins are required to properly
More informationWhat you need to know to keep your computer safe on the Internet
What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security
More informationJoint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One End User Security, IS Control Evaluation & Self- Assessment Information Security Trends and Countermeasures
More informationCertified Secure Computer User
Certified Secure Computer User Course Outline Module 01: Foundations of Security Essential Terminologies Computer Security Why Security? Potential Losses Due to Security Attacks Elements of Security The
More informationStudent ANGEL FAQs. General Issues: System Requirements:
Student ANGEL FAQs General Issues: What is ANGEL? How do I log in? What is my username and password? How do I activate my account? I forgot my C number/password, what do I do? I registered after the first
More informationComplete Patch Management
Complete Patch Management Complete - Flexible Unique In- Depth Secunia CSI 7 Corporate Software Inspector Take control of the vulnerability threat and optimize your IT security investments. The Secunia
More informationSymantec Database Security and Audit 3100 Series Appliance. Getting Started Guide
Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished
More informationPC Security and Maintenance
PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-
More informationGuideline for Prevention of Spyware and other Potentially Unwanted Software
Guideline for Prevention of Spyware and other Potentially Unwanted Software Introduction Most users are aware of the impact of virus/worm and therefore they have taken measures to protect their computers,
More informationCyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security
Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security The IT Security Office (ITSO) What We Do? Risk Assessment Network and System Security Monitoring Vulnerability Scanning
More informationBest Practice Configurations for OfficeScan (OSCE) 10.6
Best Practice Configurations for OfficeScan (OSCE) 10.6 Applying Latest Patch(es) for OSCE 10.6 To find out the latest patches for OfficeScan, click here. Enable Smart Clients 1. Ensure that Officescan
More informationWindows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
More informationCyber Security: Software Security and Hard Drive Encryption
Links in this document have been set for a desktop computer with the resolution set to 1920 x 1080 pixels. Cyber Security: Software Security and Hard Drive Encryption 301-1497, Rev A September 2012 Copyright
More informationBlackboard: Help & Guidance
Blackboard: Help & Guidance Solving problems experienced when using Blackboard 9.1 STUDENT GUIDE 1 Introduction This document covers Internet Explorer 7 (or later. We do not currently support Internet
More informationTrend Micro OfficeScan 11.0. Best Practice Guide for Malware
Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned
More informationWhy is a strong password important?
Internet Security Why is a strong password important? Identity theft motives: To gain access to resources For the challenge/fun Personal reasons Theft methods Brute forcing and other script hacking methods
More informationFortKnox Personal Firewall
FortKnox Personal Firewall User Manual Document version 1.4 EN ( 15. 9. 2009 ) Copyright (c) 2007-2009 NETGATE Technologies s.r.o. All rights reserved. This product uses compression library zlib Copyright
More informationADOBE FLASH PLAYER Local Settings Manager
ADOBE FLASH PLAYER Local Settings Manager Legal notices Legal notices For legal notices, see http://help.adobe.com/en_us/legalnotices/index.html. iii Contents Storage...............................................................................................................
More informationWireless Network Best Practices for General User
Wireless Network Best Practices for General User I n Hong Kong, the number of Wi-Fi access points (hotspots) has reached 31,000 in 2015 1. Unfortunately, not all of them are well-protected. In fact, wireless
More informationSage HRMS 2014 Sage Employee Self Service
Sage HRMS 2014 Sage Employee Self Service Pre-Installation Guide October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright 2013. Sage Software, Inc. All rights
More informationThis session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
More informationAVeS Cloud Security powered by SYMANTEC TM
Protecting your business from online threats should be simple, yet powerful and effective. A solution that secures your laptops, desktops, and servers without slowing down your systems and distracting
More informationIn order to get the most out of your Bert Rodgers courses, it is important to ensure that your computer meets some minimum system requirements.
System Requirements In order to get the most out of your Bert Rodgers courses, it is important to ensure that your computer meets some minimum system requirements. Please select your preferred or current
More information1. TURN OFF UAC SETTINGS
AKOYA INSTALLATION TECHNICAL REQUIREMENTS INTERNET EXPLORER CONFIGURATION FOR AKOYA.NET 1. TURN OFF UAC SETTINGS Before making the following changes in Internet Explorer, you must be a local administrator
More informationBackup & Disaster Recovery Appliance User Guide
Built on the Intel Hybrid Cloud Platform Backup & Disaster Recovery Appliance User Guide Order Number: G68664-001 Rev 1.0 June 22, 2012 Contents Registering the BDR Appliance... 4 Step 1: Register the
More informationDartmouth College Technical Support Document for Kronos PC version
Dartmouth College Technical Support Document for Kronos PC version Contents How to Save the Kronos URL as a Favorite or Bookmark... 2 Internet Explorer... 2 Firefox... 4 Possible Problems When Logging
More informationI N R O A D S, I N C. T R A I N I N G A N D D E V E L O P M E N T
I N R O A D S, I N C. T R A I N I N G A N D D E V E L O P M E N T Intern E- Learning Guide 2015 1 Introduction Welcome to another valuable piece of your INROADS development experience, e-learning! If you
More informationMyReports Recommended Browser Settings MYR-200a
MyReports Recommended Browser Settings MYR-200a Note: If you have installed an additional Tool Bar on your browser, such as Yahoo Tool Bar or Google Tool Bar, be sure that it is also configured to allow
More informationInformation Security
Information Security Table of Contents Statement of Confidentiality and Responsibility... 2 Policy and Regulation... 2 Protect Our Information... 3 Protect Your Account... 4 To Change Your Password...
More informationSharp Remote Device Manager (SRDM) Server Software Setup Guide
Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based
More informationIntroduction. PCI DSS Overview
Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,
More informationNATIONAL CYBER SECURITY AWARENESS MONTH
NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the
More informationInstructions to Sign On and Off of Self Service Applications. Internet Explorer 9 (IE9) Users: Turn Off Compatibility View:
Instructions to Sign On and Off of Self Service Applications NOTE: Internet Explorer 7 and 8 are the only supported Browsers for the PeopleSoft Student Self Service applications. If you experience technical
More informationSection 1.0 Getting Started with the Vālant EMR. Contents
Section 1.0 Getting Started with the Vālant EMR Contents Getting Started with the Valant EMR application:... 2 Hardware Requirements for the Vālant EMR:... 3 Software Requirements for the Vālant EMR:...
More informationHow To Use Moodle Online Class On A Pc Or Mac Or Ipad (For Acedo) On A Computer Or Mac) On Your Computer Or Ipod Or Ipo (For An Ipo) For Acedor Or Mac (
Welcome to Stanly Online, This document has been sent to you to supply the information you need to: access our online learning system AND find help, should the need arise Accessing : Your online class
More informationLearning Management System (LMS) Quick Tips. Contents LMS REFERENCE GUIDE
Learning Management System (LMS) Quick Tips Contents Process Overview... 2 Sign into the LMS... 3 Troubleshooting... 5 Required Software... 5 Mobile devices are not supported... 5 Using the Check System
More informationINFORMATION SECURITY FOR YOUR AGENCY
INFORMATION SECURITY FOR YOUR AGENCY Presenter: Chad Knutson Secure Banking Solutions, LLC CONTACT INFORMATION Dr. Kevin Streff Professor at Dakota State University Director - National Center for the Protection
More informationSchools of Distance Education. Computer check-up for students using Mac OS X 10.10 (Yosemite) devices
Schools of Distance Education Computer check-up for students using Mac OS X 10.10 (Yosemite) devices The check-up summary Start of each term 1. Check your internet connection 2. Clean your computer 3.
More informationHow to Use Windows Firewall With User Account Control (UAC)
Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security
More informationGet Started Guide - PC Tools Internet Security
Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools
More informationRemote Access Services Apple Macintosh - Installation Guide
Remote Access Services Apple Macintosh - Installation Guide Version. February, 05 P age Contents GETTING STARTED... JAVA VERIFICATION, INSTALLATION, AND CONFIGURATION... Checking Mac OS version... Java
More informationFrequently Asked Questions Ag Banking Online
Table of Contents Note: To quickly navigate to the answer, click on the question. What is Multi-Factor Authentication (MFA) and its purpose?... 2 This is my first time accessing the online application.
More informationBusiness ebanking Fraud Prevention Best Practices
Business ebanking Fraud Prevention Best Practices User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters, numbers, and special
More informationAccessing Websites. Mac/PC Compatibility: QuickStart Guide for Business
Accessing Websites Mac/PC Compatibility: QuickStart Guide for Business 2 Accessing Websites QuickStart Guide for Business The Basics People use the web for research, entertainment, and business. And it
More informationREMOTELY ACCESS YOUR FILES WITH THE FLAGLER FILECONNECT SYSTEM
REMOTELY ACCESS YOUR FILES WITH THE FLAGLER FILECONNECT SYSTEM This document explains the various ways to connect to your network files and group share data. In addition, staff and full-time faculty are
More informationThe Importance of Patching Non-Microsoft Applications
The Importance of Patching Non-Microsoft Applications Technical WHITE PAPER The Importance of Patching Non-Microsoft Applications In the past, organizations patched only Microsoft operating systems. As
More informationSystem Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
More informationQuickStart Guide for Client Management. Version 8.7
QuickStart Guide for Client Management Version 8.7 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software
More informationNew Online Banking Guide for FIRST time Login
New Online Banking Guide for FIRST time Login Step 1: Login Enter your existing Online Banking User ID and Password. Click Log-In. Step 2: Accepting terms and Conditions to Proceed Click on See the terms
More informationInternet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions.
Internet Quick Start Guide Get the most out of your Midco internet service with these handy instructions. 1 Contents Internet Security................................................................ 4
More informationAirtel PC Secure Trouble Shooting Guide
Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does
More informationMULTIFUNCTIONAL DIGITAL COLOR SYSTEMS / MULTIFUNCTIONAL DIGITAL SYSTEMS. e-filing Guide
MULTIFUNCTIONAL DIGITAL COLOR SYSTEMS / MULTIFUNCTIONAL DIGITAL SYSTEMS e-filing Guide 2012-2014 TOSHIBA TEC CORPORATION All rights reserved Under the copyright laws, this manual cannot be reproduced in
More informationCONNECT-TO-CHOP USER GUIDE
CONNECT-TO-CHOP USER GUIDE VERSION V8 Table of Contents 1 Overview... 3 2 Requirements... 3 2.1 Security... 3 2.2 Computer... 3 2.3 Application... 3 2.3.1 Web Browser... 3 2.3.2 Prerequisites... 3 3 Logon...
More informationSecure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
More informationCloud Computing. Security Practices for General User. Examples of Popular Cloud Service Providers
Cloud Computing Security Practices for General User T he cloud is composed of an extensive bulk of computers owned by a third-party in remote location(s). The Internet provides a bridge between personal
More informationSC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide
SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that
More informationAjera 7 Installation Guide
Ajera 7 Installation Guide Ajera 7 Installation Guide NOTICE This documentation and the Axium software programs may only be used in accordance with the accompanying Axium Software License and Services
More informationInstalling Citrix for Mac
Installing Citrix for Mac 1) Go to: http://receiver.citrix.com. 2) Click on Download Receiver. 3) On the bottom left hand corner of your computer screen, the Citrix Download should appear. Click on that
More informationMalware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services
Malware, Spyware, Adware, Viruses Gracie White, Scott Black Information Technology Services The average computer user should be aware of potential threats to their computer every time they connect to the
More informationBusiness Internet Banking / Cash Management Fraud Prevention Best Practices
Business Internet Banking / Cash Management Fraud Prevention Best Practices This document provides fraud prevention best practices that can be used as a training tool to educate new Users within your organization
More informationRemoteTM Web Server User Guide. Copyright 2008-2014 Maxprograms
RemoteTM Web Server User Guide Copyright 2008-2014 Maxprograms Contents 3 Contents Introduction...5 Requirements...5 Installation...7 Email Server Configuration...7 Users Management...8 Create User...8
More informationReliance Bank Fraud Prevention Best Practices
Reliance Bank Fraud Prevention Best Practices May 2013 User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters and numbers.
More informationComputer Viruses: How to Avoid Infection
Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you
More informationHousekeeping Your PC
for WINDOW 7 Course documentation Material at:sussex.ac.uk/its/training/material/housekeeping University of Sussex Updated: June 2011 IT Services Created: December 2002 University of Sussex IT Services
More informationThe Importance of Patching Non-Microsoft Applications
The Importance of Patching Non-Microsoft Applications Technical WHITE PAPER The Importance of Patching Non-Microsoft Applications In the past, organizations patched only Microsoft operating systems. As
More informationSecuraLive ULTIMATE SECURITY
SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security
More informationINROADS, INC. TRAINING AND DEVELOPMENT. Intern E- Learning Guide 2012 (rev. 4.2012)
INROADS, INC. TRAINING AND DEVELOPMENT Intern E- Learning Guide 2012 (rev. 4.2012) 1 Introduction Welcome to another valuable piece of your INROADS development experience, e learning! If you are unfamiliar
More informationhttp://vpn.madeleyacademy.com
Madeley Academy Remote Access http://vpn.madeleyacademy.com Members of Staff and Sixth form students are able to log into the shared and their user areas from home. System requirements Antivirus Trusted
More informationPLATO Learning Environment System and Configuration Requirements for workstations. October 27th, 2008
PLATO Learning Environment System and Configuration Requirements for workstations October 27th, 2008 Windows 2000 Professional with SP4 Windows XP Professional with SP2 Windows XP Home Edition with SP2
More informationK7 Business Lite User Manual
K7 Business Lite User Manual About the Admin Console The Admin Console is a centralized web-based management console. The web console is accessible through any modern web browser from any computer on the
More informationF-Secure Internet Security 2012
F-Secure Internet Security 2012 F-Secure Internet Security 2012 TOC 3 Contents Chapter 1: Getting started...7 How to use automatic updates...8 Check the update status...8 Change the Internet connection
More informationTechnical Guide for Remote access
Technical Guide for Remote access Frequently Asked Questions about using EZ Proxy to access Library resources off campus. Login Help Who is allowed access? I m having trouble logging in. Finding Articles
More informationBest Practices Guide to Electronic Banking
Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have
More information2. Installation and System requirements
RELEASE NOTES F-Secure Anti-Virus for Windows Servers Version 9.00 build 333 Copyright 1993-2010 F-Secure Corporation. All Rights Reserved. Portions Copyright 2004 BackWeb Technologies Inc. This product
More informationSTUDENT ADMINISTRATION TRAINING GUIDE SETTING YOUR BROWSER FOR PEOPLESOFT DOWNLOADS
STUDENT ADMINISTRATION TRAINING GUIDE SETTING YOUR BROWSER FOR PEOPLESOFT DOWNLOADS Table of Contents How to check the browser version... 3 PC - Internet Explorer... 8 Internet Explorer V9 Compatibility
More informationSymantec AntiVirus Corporate Edition Patch Update
Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec
More informationVMware vcenter Support Assistant 5.1.1
VMware vcenter.ga September 25, 2013 GA Last updated: September 24, 2013 Check for additions and updates to these release notes. RELEASE NOTES What s in the Release Notes The release notes cover the following
More informationIntelligent Office: Web Optimisation Guide. Published Date: 06/11/2015. Version: 3.3
Intelligent Office: Web Optimisation Guide Published Date: 06/11/2015 Version: 3.3 Table of Contents System Requirements:... 3 Introduction... 3 Difficulties Logging on to Intelligent Office (io)... 3
More informationEmail Getting Started Guide Unix Platform
Edition/Issue Email Getting Started Guide Unix Platform One of the most important features of your new Web Hosting account is access to a personalized Email solution that includes individual Email addresses
More informationavast! Free Antivirus for Mac Quick Start Guide avast! Free Antivirus for Mac Quick Start Guide
avast! Free Antivirus for Mac Quick Start Guide 1 Introduction Welcome to avast! Free Antivirus for Mac. avast! Free Antivirus for Mac contains the same ICSA Certified scan engine as all avast! antivirus
More informationSURPASS HOSTING SERVICE GETTING STARTED AND OPERATIONS GUIDE
SURPASS HOSTING SERVICE GETTING STARTED AND OPERATIONS GUIDE Welcome To Surpass Hosting Service. This document contains instructions to help you get up and running with your new service. The instructions
More informationChapter 15: Computer and Network Security
Chapter 15: Computer and Network Security Complete CompTIA A+ Guide to PCs, 6e What is in a security policy Mobile device security methods and devices To perform operating system and data protection How
More informationSecurity Awareness. ITS Security Training. Fall 2015
Security Awareness ITS Security Training Fall 2015 Why am I here? Isn t security an IT problem? Technology can address only a fraction of security risks. You are a primary target, or rather, your data
More informationThe UC Learning Center: Disabling Pop-Up Blockers
The UC Learning Center: Disabling Pop-Up Blockers In order to launch online courses within the UC Learning Center all pop-up blockers must be turned off. This guide will walk you through disabling pop-up
More informationFirewalls and Software Updates
Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General
More informationInitial Access and Basic IPv4 Internet Configuration
Initial Access and Basic IPv4 Internet Configuration This quick start guide provides initial and basic Internet (WAN) configuration information for the ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
More informationComputer Security Literacy
Computer Security Literacy Staying Safe in a Digital World Douglas Jacobson and Joseph Idziorek CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis
More informationOptimal Browser Settings for Internet Explorer Running on Microsoft Windows
Optimal Browser Settings for Internet Explorer Running on Microsoft Windows If you have Internet Explorer 7 or 8: Each time you log in to our web site, it evaluates whether you are using the same computer
More informationIntel Unite Solution. Standalone User Guide
Intel Unite Solution Standalone User Guide Legal Disclaimers & Copyrights All information provided here is subject to change without notice. Contact your Intel representative to obtain the latest Intel
More informationSophistication of attacks will keep improving, especially APT and zero-day exploits
FAQ Isla Q&A General What is Isla? Isla is an innovative, enterprise-class web malware isolation system that prevents all browser-borne malware from penetrating corporate networks and infecting endpoint
More informationSpyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc.
Spyware Michael Glenn Technology Management Michael.Glenn@Qwest.com Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References
More informationFive Tips to Reduce Risk From Modern Web Threats
Five Tips to Reduce Risk From Modern Web Threats By Chris McCormack, Senior Product Marketing Manager and Chester Wisniewski, Senior Security Advisor Modern web threats can infect your network, subvert
More informationCitrix : Remediation - MAC
Citrix : Remediation - MAC Key Points: 1. 2. 3. 4. 5. 6. 7. Understanding End Point Scan Analysis Supported anti-virus and firewall products Configuring AVAST/SOPHOS and the Mac OS X Firewall Installing
More informationHow To Use Secureanything On A Mac Or Ipad (For A Mac)
User Guide for Mac OS X Copyright Webroot SecureAnywhere User Guide for Mac OS X March, 2013 2012-2013 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere is
More informationInstructions for Department of Public Health (DPH) WebConnect (Mac)
Instructions for Department of Public Health (DPH) WebConnect (Mac) UCSF at SFGH Computing and Network Services Hours of Operation: Monday Friday 8 AM to 5PM Pacific Time Website: http://tiny.ucsf.edu/sfghcns
More information