Top 10 Computer Security Mistakes Made by Individuals


Top 10 Computer Security Mistakes Made by Individuals
Computer, information and internet security is a continual challenge for computer programmers and software developers that is constantly changing and evolving. In this uncertain age of global terrorism and the constant threat of identity theft,  governments, banking industry, and computer industry are faced with this issue constantly and as a result create a demand for innovative people who can rise to the challenge of staying ahead of new technology.


1. Passwords on Post-it Notes

The ubiquitous Post-It Note appears to be a major crippler of security measures.  Leaving a note with your valid password written on it posted near your computer monitor is the most frequent violation of information security policy. Some experts say one out of five employees is guilty. It’s too easy for someone to copy it down and gain legitimate access to your systems with your password. It’s the equivalent of identity theft. Toss those notes into the shredder and change your password now.

2. Leaving Your Computer Unattended

Too many people simply leave their computers on and walk away to do other things. Didn’t your parents teach you to turn off the lights? The point isn’t to save energy. It’s to save from a potentially costly and embarrassing computer breach. Even the best passwords are worthless if someone can access your systems while you are absent.

3. Opening E-mail Attachments from Strangers 

Believe it or not, the “Love Bug” virus cost business billions of dollars worldwide. There is no substitute for looking before you leap and open any e-mail. There’s a reason why these types of cyber attacks are so successful: trust and curiosity in human nature can be easily abused. Don’t let it be you unknowingly spreading the latest computer virus.

4. Poor Password Etiquette

Everyone should take a quick course in password etiquette. Don’t let your default password remain as your primary password. Do not enter the same password you have always had when the system asks you to change your password. Be original; think of your own combination of letters and numbers. Remember, the longer the better.

5. Laptops on the Loose 

While theft of a laptop computer that’s loaded with company secrets can happen in the airport, it’s just as likely to happen from your office overnight. Lock the laptop in a desk drawer, out of sight, to minimize the risk or the temptation for it to walk.

6. Blabber Mouths 

Talking about your passwords, or about confidential information over lunch, in the break room, after work, in a public drinking spot, or at the gym only increases the risk of someone gaining access to information they are not authorized to have. Not everyone needs to know.

7. Plug and Play without Care

In the rush to get things going, too many folks bypass routers and firewalls and connect home computers straight into the Internet. Spend the time and money to do it right to avoid all the fallout later.

8. Not Reporting Security Violations

And you have to be willing to report a breach of security if you observe it in another individual. It’s no time to worry about being a tattletale. Your success depends on prompt action to avert or respond to an incident.

9. Always Behind the Times (The Patch Procrastinator) 

One of the biggest vulnerabilities of any home computer system is the failure to install updates and patches for deployed software. Updates often close loopholes that may exist. Ignoring them or putting them off for another day could cost you  dearly.

10. Keeping an Eye on the Organization 

While most managers believe an information security breach will come from an outside intruder, they are wrong. The biggest risk comes from within. Disgruntled students, laid-off employees, a less than ethical contractor, or an employee playing both sides of the fence are all potential threats. Every employee has to be responsible for themselves and the behavior they observe in others.“Only you can prevent security incidents,” says Smokey the anti-hacker.

Comments

Popular Posts