Updating...
Skip to main content
Filter your search by category. Current category:
All
All
Knowledge Base
Service Catalog
Search the client portal
Search
Sign In
Show Applications Menu
Client Portal
Sign In
Search
Home
Services
Knowledge Base
More Applications
Skip to Knowledge Base content
Search
Articles
Blank
Knowledge Base
IT Professional Services
What are the end user PC security best practices?
What are the end user PC security best practices?
Usernames and Passwords
Software patch updates
Anti-virus software
Firewall software
E-mail Management
Data Encryption
Web browsing
Physical security
Unnecessary application/services
General Items
Usernames and Passwords
Users should change default passwords and use strong passwords. Passwords should not be shared. Passwords should not be written down.
Software patch updates
Be certain that applications and operating systems are up-to-date with patches.
Anti-virus software
Anti-virus software should be installed. Anti-virus software should be configured to update daily. Do not disable anti-virus software.
Firewall software
While the university provides in-depth security defenses, all end-users are urged to not disable firewall software provided by the operating system vendor.
E-mail Management
Do not open unsolicited or unrecognized e-mail. Do not send confidential or sensitive information without proper authorization and strong approved encryption. University e-mail account should be used for university business only. Do not use e-mail systems other than the university e-mail system –
TROY email
.
Data Encryption
If maintaining confidential or sensitive data, be certain that data encryption of the network traffic and any local copy is enabled. Do not store confidential or sensitive data on external drives or media. Contact IT for assistance.
Web browsing
Limit Web browsing to work-related sites. Be vigilant of downloading software or files from the Internet. Do not visit “adult” content sites.
Physical security
Unauthorized physical access to an unattended device can result in harmful or fraudulent modification of data, fraudulent email use, or any number of other potentially dangerous situations.
Lock or Log-off computers when leaving desks devices, or, device is unattended.
Secure portable devices in the office and while traveling. Keep window blinds closed while away from your office.
Unnecessary application/services
If a service is not necessary for the intended purpose or operation of the device, that application/service should not be running.
General Items
Instant messaging is discouraged. Visit the technology usage policy at
https://www.troy.edu/epolicy/800-technology.html
. Do not insert “found” USB drives, CD-ROM’s, etc. If office keys are lost, contact campus security immediately.
Sign in to leave feedback
0 reviews
Blank
Blank
Blank
Blank
Print Article
Deleting...
×
Share
Recipient(s)
- separate email addresses with a comma
Message
Press Alt + 0 within the editor to access accessibility instructions, or press Alt + F10 to access the menu.
Check out this article I found in the Client Portal knowledge base.<br /><br /><a href="https://helpdesk.troy.edu/TDClient/1924/Portal/KB/ArticleDet?ID=40564">https://helpdesk.troy.edu/TDClient/1924/Portal/KB/ArticleDet?ID=40564</a><br /><br />What are the end user PC security best practices?