What are the end user PC security best practices?

  1. Usernames and Passwords
  2. Software patch updates
  3. Anti-virus software
  4. Firewall software
  5. E-mail Management
  6. Data Encryption
  7. Web browsing
  8. Physical security
  9. Unnecessary application/services
  10. General Items
  11. Usernames and Passwords
     
    Users should change default passwords and use strong passwords. Passwords should not be shared. Passwords should not be written down.
  12. Software patch updates
     
    Be certain that applications and operating systems are up-to-date with patches.
  13. Anti-virus software
     
    Anti-virus software should be installed. Anti-virus software should be configured to update daily. Do not disable anti-virus software.
  14. Firewall software
     
    While the university provides in-depth security defenses, all end-users are urged to not disable firewall software provided by the operating system vendor.
  15. E-mail Management
     
    Do not open unsolicited or unrecognized e-mail. Do not send confidential or sensitive information without proper authorization. University e-mail account should be used for university business only. Do not use e-mail systems other than the university e-mail system – Troy email.
  16. Data Encryption
     
    If maintaining confidential or sensitive data, be certain that data encryption of the network traffic and any local copy is enabled. Do not store confidential or sensitive data on external drives or media. Contact IT for assistance.
  17. Web browsing
     
    Limit Web browsing to work-related sites. Be vigilant of downloading software or files from the Internet. Do not visit “adult” content sites.
  18. Physical security
     
    Unauthorized physical access to an unattended device can result in harmful or fraudulent modification of data, fraudulent email use, or any number of other potentially dangerous situations. Log-off or shut down computers when leaving desks devices, or, device is unattended. Secure portable devices in the office and while traveling.
  19. Unnecessary application/services
     
    If a service is not necessary for the intended purpose or operation of the device, that application/service should not be running.
  20. General Items
     
    Instant messaging is discouraged. Visit the technology usage policy at http://www.troy.edu/epolicy/manuals/800.htm. Do not insert “found” USB drives, CD-ROM’s, etc. If office keys are lost, contact campus security immediately.

http://it.troy.edu/services-support/best-practices/end-user-pc-security.html

  1. Usernames and Passwords
  2. Software patch updates
  3. Anti-virus software
  4. Firewall software
  5. E-mail Management
  6. Data Encryption
  7. Web browsing
  8. Physical security
  9. Unnecessary application/services
  10. General Items

Users should change default passwords and use strong passwords. Passwords should not be shared. Passwords should not be written down.

Be certain that applications and operating systems are up-to-date with patches.

Anti-virus software should be installed. Anti-virus software should be configured to update daily. Do not disable anti-virus software.

While the university provides in-depth security defenses, all end-users are urged to not disable firewall software provided by the operating system vendor.

Do not open unsolicited or unrecognized e-mail. Do not send confidential or sensitive information without proper authorization. University e-mail account should be used for university business only. Do not use e-mail systems other than the university e-mail system – mail.troy.edu.

If maintaining confidential or sensitive data, be certain that data encryption of the network traffic and any local copy is enabled. Do not store confidential or sensitive data on external drives or media. Contact IT for assistance.

Limit Web browsing to work-related sites. Be vigilant of downloading software or files from the Internet. Do not visit “adult” content sites.

Unauthorized physical access to an unattended device can result in harmful or fraudulent modification of data, fraudulent email use, or any number of other potentially dangerous situations. Log-off or shut down computers when leaving desks devices, or, device is unattended. Secure portable devices in the office and while traveling.

If a service is not necessary for the intended purpose or operation of the device, that application/service should not be running.

  1. Usernames and Passwords
  2. Software patch updates
  3. Anti-virus software
  4. Firewall software
  5. E-mail Management
  6. Data Encryption
  7. Web browsing
  8. Physical security
  9. Unnecessary application/services
  10. General Items

Instant messaging is discouraged. Visit the technology usage policy at http://www.troy.edu/epolicy/manuals/800.htm. Do not insert “found” USB drives, CD-ROM’s, etc. If office keys are lost, contact campus security immediately.

http://it.troy.edu/services-support/best-practices/end-user-pc-security.html

Details

Article ID: 40564
Created
Tue 10/10/17 1:00 PM
Modified
Thu 2/7/19 12:41 PM