This document provides guidelines for proper computer security and use of IT resources. It lists both "Do's" and "Don'ts". The "Do's" include creating strong passwords, regularly backing up important data, using antivirus software and updating it regularly. The "Don'ts" advise against writing down or sharing passwords, downloading unauthorized content, and leaving devices unattended. Users are reminded to only use IT systems for authorized purposes and be mindful of security and bandwidth usage.
This document provides guidelines for proper computer security and use of IT resources. It lists both "Do's" and "Don'ts". The "Do's" include creating strong passwords, regularly backing up important data, using antivirus software and updating it regularly. The "Don'ts" advise against writing down or sharing passwords, downloading unauthorized content, and leaving devices unattended. Users are reminded to only use IT systems for authorized purposes and be mindful of security and bandwidth usage.
This document provides guidelines for proper computer security and use of IT resources. It lists both "Do's" and "Don'ts". The "Do's" include creating strong passwords, regularly backing up important data, using antivirus software and updating it regularly. The "Don'ts" advise against writing down or sharing passwords, downloading unauthorized content, and leaving devices unattended. Users are reminded to only use IT systems for authorized purposes and be mindful of security and bandwidth usage.
FPPT.com Computer Security Do’s and Don’ts Information Technology Division
Create strong passwords that are at
least eight characters long, and including at least a numerical value and a symbol, such as #, to foil password-cracking software. Avoid common words, and never disclose a password online. • Change your password every ninety days. • Perform regular backups of important data. Create a password for your files in order to protect file sharing activities. • Delete any message that refers to groups or organizations that you are not a part of. • • Download and install software only from online sources you trust. • • Never click on a link from an untrusted source. • • Close windows containing pop-up ads or unexpected warnings by clicking on the “X” button in the upper most right hand corner of that window, not by clicking within the window. • • Use antivirus software, and update it on a regular basis to recognize the latest threats. • DON’TS • Never write down your password. Especially on a Post- It note stuck to your computer! • Never give out your password to anyone, whether you know them or not. • Never select the "Remember My Password" option. Many applications do not store them • securely. • Never purchase anything promoted in a spam message. Even if the offer isn’t a scam, you are • only helping to finance and encourage spam. • Please refrain from opening an e-mail attachment, even from someone you know well, unless • you were expecting it. • Avoid creating common passwords such as your name, social security, UNI, etcetera. • Do not leave your laptop unattended, even for a few minutes. • Never reply to e-mail(s) requesting financial or personal information. • Avoid opening e-mail(s) or e-mail attachments from an unknown sender. • Please refrain from clicking on the close button within pop-up ads. • Under no circumstances should you install or use pirated copies of software. • Do not install P2P file sharing programs which can illegally download copyrighted material. • Never set your e-mail program to "auto-open" attachments DO'S AND DON'TS These guidelines provide a brief reminder of the key obligations of people using the University's IT facilities. All users must be familiar with, and abide by, the IT Acceptable Use and Security Policy. DON’TS DON’TS Don't access pornographic or obscene material or material that could offend others. DON’TS
Don't let anyone else
use any of your accounts or tell anyone your password. DON’TS Don't download videos, music or anything else that's copyrighted by other people. DON’TS • Don't use IT facilities to bully or harass other people. • Don't install unlicensed or malicious software. • Don't use IT facilities to advertise goods or services. • Don't uninstall security software from your University-owned devices. DO’S • Follow the SecureIT advice about IT security. • Log out of computer systems when you have finished using them. • Only use University IT systems for purposes relating to your study, research or work at the University. • Remember that all use of IT facilities is logged and monitored. • Remember that every website you visit or page that you print costs the University money. • Think carefully about your online conduct to protect personal information. • Keep your operating systems and software up to date. • A comprehensive list of web content do's and don'ts is maintained by the Marketing and Communications Team. • Tips and Dos & Don'ts • 1. Do not share your passwords • 2. Turn off electronic devices (monitors, computers, panels, TVs, projectors, etc...) when not in use to prolong the life of the device • 3. Save all your documents/files to your H drive to avoid losing anything in case your technician has to image your computer (this will delete everything including your programs installed locally) • 4. When logging into a computer use YOUR user name and password not somebody else's and do not let anybody else use yours. • 5. Logoff/Logout when leaving a computer you have logged in from, including if you are just "going to be gone for only a couple of minutes". • 7. Use the "web" for instructional purposes • 8. Only be logged into one computer at a time. • 9. We can not put District Software on a personal equipment/device • 10. We can not put personal software on Lex2 equipment/devices • 11. Do not listen to music or watch videos via the web during your "down time". Videos are bandwidth hogs, your colleagues may need the bandwidth for instructional needs. • 12. Do NOT open email attachments unless you were expecting it. Email the user back and ask if it is indeed from them. Hackers will "fake" an email account in an attempt to trick people into giving out information or to install viruses.