Quantcast
Channel: IT-Toolkits.com
Viewing all articles
Browse latest Browse all 62

Security Tip of the Week

$
0
0

Security ManualWhile using wireless hotspots, limit activity to Web surfing only. A hotspot is an open wireless network that is available (open) to everyone. An example would be the wireless network at your favorite coffee shop. These networks hook computers into the public Internet -- handy but dangerous. Because wireless hotspots are for open use, they don't provide much protection for your data. When using a wireless hotspot try to limit activity to web surfing only.

You should also disable peer-to-peer networking, file sharing, and remote access. Always use a good personal firewall and of course make sure all your software including your operating system (like Windows) is up to date and patched. You  should never use hotspots for online banking, bill paying, or for making purchases that require you to give out confidential information such as a credit card number.

Order Security ManualSample DRP
Other Redings
  • Fraud is on the rise CIOs need to address fraud issues with better security For the last three years it has been reported that estimated fraud losses that are doubling...
  • Cyber war breaks out – slows Internet Cyber war pushes need for more security The recent cyber war between Spamhaus and Cyberbunker with commercial Denial of Service Attack (DDoS) pushed the Internet...
  • CIOs are not conducting cloud computing risk assessments CIOs are not conducting cloud computing risk assessments A new survey by Protiviti has found that cyber security tops chief information officers’ concerns, with 84...
  • Many CIOs have not addressed cloud security issues Less than 50% of all organizations have policies in place that for vetting cloud computing applications for possible security risks before deploying them. The number...
  • Email Spam Reporting Policy E-mail Spam Reporting Policy Note: Of course legitimate, individually-sent employment, business and personal inquiries are not considered spam.  Below is a sample of a letter...

Viewing all articles
Browse latest Browse all 62

Latest Images

Trending Articles





Latest Images