Showing posts with label Essential. Show all posts
Showing posts with label Essential. Show all posts

Computer Security: The Essential Components for A Safe Computer


These days, computers are almost as common in households as telephones. Computers themselves do not cause any threat to individual security. When connected with networks and the chaos that is the World Wide Web, computers have become the tools that identity thieves and hackers use to extrapolate this chaos. In order to establish computer security, software companies have created devices to ward off the hazards and hassles of viruses, spyware, pop-ups and spam.

The first of these creations is anti-virus software. There are two main companies that offer this software: McAfee and Norton. These programs work to scan the files on your computer and check them for attributes that are in viruses or are often linked with viruses. These traits or attributes are often called virus definitions and need to be downloaded on a relatively regular basis. In addition to the files on your computer, files on CDs, floppy discs and e-mails can and should be filed. There is no question on this one: anti-virus software is vital to computer security.

Next on the list is spyware scanning software. Spyware occurs when certain websites run programs in the back ground of your computer while gleaning information from it. The information can be as benign as tracking what type of websites you look at, to actually acquiring passwords. Regardless of the type of spyware, it can slow your computer to a crawl and needs to be removed from your computer. Two popular software options are Spy Sweeper and Ad-ware.

Last, but certainly not least are pop-up blockers and span filters. Not only are pop-ups and spam annoying, but these often contain the spyware scanning software explained above. In addition, they can slow your computer down incredibly. And when you are angry at your computer, your computer is not secure!

In addition to these software items, there are a few more tricks you can use to keep your computer and your information secure. Password secure everything you can, and when you create the passwords, don't make them easy. Do not use your name, your birthday or your social security number. And, if you are on an unsecured wireless network, do not check your bank statements. These networks allow several people on them at one time. Remember, hackers are smart. You have to be smarter!




Sara Chambers is a marketing consultant and an internet content manager for http://www.computersecurityblog.com




Essential Security Policies For Human Resources


This security-related human resource policy example outlines how employee information technology should be addressed. The goal is ensure that all personnel are aware of best practices used to protect information and how to ensure proper usage of their networking equipment, according to organization rules, standards, and guidelines.

While this document covers many rules, standards, and guidelines, it is not exhaustive. So, human resource administrators, employees, contractors, and third parties should exercise due care with regard to how employee information technology is handled.

New employees should receive information security training and occasional awareness updates to promote employee vigilance within the company. These activities ensure that employees understand and take responsibility for company information and resources.

The following minimum procedures should be clearly spelled out and enforced.

The employee is not allowed to download and/or install unauthorized software onto organization computers nor should they connect to the network with unauthorized equipment.
The employee is not allowed to hinder the proper operation of protection tools including antivirus programs, screensavers, etc.
The employee is not allowed to access prohibited sites via the Internet.
Employees must inform their immediate superior and the IT department of any security incident or malfunction they encounter.
Employee should be instructed in the creation of strong passwords and proper password storage. In addition, the password should expire after a certain length of time depending on the access sensitivity.
When an employee moves or changes roles within the organization their access privileges must be updated accordingly.
When terminating an employee, the employee's access to technology resources should be immediately suspended.
Once the employee has been informed of the termination, he should not be allowed to return to his office but should be immediately escorted out of the building.
The IT department should have a list of all user accounts and suspend the appropriate accounts immediately.
Log files should be routinely scanned to ensure that all employees' accounts were suspended.
The supervisor should be responsible for reviewing all employee electronic information and either disposing of it or forwarding it to their replacements.
The supervisor should be responsible for the return of all the terminated employees access cards, ID badges, and manuals.
The supervisor should be responsible for the return of all company owned electronic equipment issued to the terminated employee including laptops, wireless cards, cell phones, and PDAs.A formal disciplinary process concerning any and all users who breach security rules must be developed and published within the organization.

In order to ensure that the organization is not ethically or legally liable for misconduct any employee accused of a malicious activity should be treated equally and not given preferential treatment. Also, any investigation into suspicious employee conduct should examine all material facts.




The author is a computer security professional with experience protecting small business and home networks. He also teaches the basics of computer network security at 365 Computer Security Training where he blogs regularly and creates video training and educational materials related to information security. Learn more at http://www.365ComputerSecurityTraining.com.




 
Support : Creating Website | Johny Template | Mas Template
Copyright © 2011. Information Computer and Technology - All Rights Reserved
Template Modify by Creating Website
Proudly powered by Blogger