precautions while using computer and laptops

Precautions while using Computer and Laptops

Precautions while using Computer and Laptops
31. Frequently back up important documents and files
Back up your data frequently. This protects your data in the event of an operating system crash, hardware failure, or virus attack. UITS recommends saving files in multiple places using two different forms of media e.g., Cloud Storage, Oncourse Resources, or USB flash drive. See At IU, what options do I have for storing files.
32. Never share passwords or passphrases
Pick strong passwords and passphrases, and keep them private. Never share your passwords or passphrases, even with friends, family, or computer support personnel.
33. Do not download unfamiliar software off the Internet
KaZaA, Bonzi, Gator, HotBar, WhenUSave, CommentCursor, WebHancer, LimeWire, and other Gnutella programs all appear to have useful and legitimate functions. However, most of this software is or contains spyware, which will damage your operating system installation, waste resources, generate pop up ads, and report your personal information back to the company that provides the software.
34. Lock your computer when stepping away
Forgetting to log out poses a security risk with any computer that is accessible to other people including computers in public facilities, offices, and shared housing, because it leaves your account open to abuse. Someone could sit down at that computer and continue working from your account, doing damage to your files, retrieving personal information, or using your account to perform malicious actions. For an example of possible consequences, see this entry in the Protect IU Blog. To avoid misuse by others, remember to log out of or lock your computer whenever you leave it.
35. Test computers after you are finished with them
For computers in the UITS Student Technology Centers STCs or Residential Technology Centers RTCs, logging out is sufficient to protect the security of your accounts and data. With other computers, however, it is usually necessary to shut them down after you have finished to prevent unauthorized access. Shutting down a computer prevents others from hacking it remotely, among other risks.
36. Restrict remote access
UITS recommends that you disable file and print sharing. In rare exceptions when you may need to share a resource with others, you should format your drive using NTFS, and correctly set the file and directory permissions.UITS also recommends disabling Remote Desktop RDP and Remote Assistance, unless you require these features. If you do, enable the remote connections when needed, and disable them when youre finished. Note that you only need to enable RDP on the computer you intend to connect to; disabling RDP on the computer youre connecting from will not prevent you from making a connection to another computer.
37. Treat sensitive data very carefully
For example, when creating files, avoid keying the files to Social Security numbers, and dont gather any more information on people than is absolutely necessary.
38. Remove data securely
Remove files or data you no longer need to prevent unauthorized access to them. Merely deleting sensitive material is not sufficient, as it does not actually remove the data from your system. For information on secure data removal, see Securely Removing Data.
39. Shut it down
Unlike a desktop computer a laptop computer needs to be shut down when not in use. Shutting down when not in use prevents the laptop from overheating and it also needs the rest.
40. Adjusting power settings
Adjusting your power options will help your laptop from heating up when not in use even if for short periods of time. You can set your hard drive and display to turn off after a set time period. Another option is to set the laptop to go into standby or hibernate mode.