|Protect Your Computer|
1. Don't email personal or financial information. Always be cautious about opening any attachment or downloading any files from emails you receive regardless of who sent them.
2. Use anti-virus software and keep it up to date. Phishing emails may contain software that can harm your computer or track your activities on the Internet without your knowledge. Combined with a firewall, anti-virus software can protect you from inadvertently accepting such unwanted files. Look for anti-virus software that recognizes current viruses as well as older ones that can effectively reverse the damage and updates automatically.
3. A firewall helps make you invisible on the Internet and blocks all communications from unauthorized sources. It is especially important to run a firewall if you have a broadband connection such as DSL or Cable. To purchase a firewall, check out anti-virus software.
4. Make sure that you always update your computer with the latest Microsoft Windows and Macintosh software updates. Having up to date anti-virus software is also essential to stop viruses and worms from attacking your computer.
5. Increase the security settings on your Internet Web Browser to their highest settings. You may need to tweak these depending on your usage.
6. Be careful with wireless usage on your laptops. Avoid using them in public places where hackers can potentially steal passwords and other personal information saved on your laptop.
7. Remember to backup your computer files. If you do get a virus or your computer crashes, you will always have the backup to fall back on. An external hard drive and some automated backup software to copy the data would be ideal.
8. Don't download or install programs or files if you do not know where they came from. Trust no one when it comes to unknown emails.
9. Be wary of file sharing sites and programs that allow you to trade files on your computer. Many times hackers use this as easy access to your computer files.
Passwords and User IDs
For each computer or on-line service you use, you should have a user ID and password. Most online systems now require a secondary verification known as multifactor verification. Use of pictures, challenge questions, tokens or even secondary passwords are very common and should be used whenever possible. Try to create the most bizarre and original password, and make sure you protect it. Commit your password to memory and don't share it with anyone. The following easily identifiable items should never be used when creating passwords:
Tips for creating strong passwords:
ONCE A MEMBER ALWAYS A MEMBER!