Security
and Firewall News
|
WatchGuard
releases version 12
Firmware and WSM.
(WatchGuard)
CITS
currently recommends
Symantec End Point
Protection antivirus
software to protect your
network, workstations, and
servers.
Our servers and
workstations remain protected
by Symantec End-Point
Protection for Servers and
Workstations. We have not
found a secondary solution we
currently feel is reliable.
|
Google
Chrome vulnerability
- Link
CISCO
Security Advisories
- Link
Alexa
and Google voice hacks
- Link
|
1.
Keep the password for your User
ID secure. Don't share it with
anyone, not family, friends or
employees. Change your password
often.
2. Configure your antivirus
software to check for updates at
least daily.
3. Patch your computer software
with critical updates as soon as
they are released. Both
Microsoft and Apple publish
periodic security/critical
updates for their operating
systems.
4. Don't use desktop search
products. These transmit your
computer's contents, including
web history, to external servers
where it can be viewed by
others. If your computer
contains private or business
data you should NOT install any
search products.
5. Be wary of e-mail
attachments. Antivirus software
will not protect your computer
completely from e-mail viruses
and worms. Be cautious with
every e-mail message that
contains an attachment. Verify
the source first, and scan an
attachment before opening it.
6. Your bank will not contact
you via email asking for
personal or account information.
They will not send you request
via email to logon to your
account and test their system or
your account information - this
is ALWAYS a scam.
7. Use a password on your
screensaver.
8. Install and run anti-spyware
software on Windows computers.
Spyware and adware are malicious
software that can intercept
information or take partial
control of your computer without
your knowledge or consent. We
suggest MalwareBytes AntiMalware
(MBAM)
and Spybot Search & Destroy
(SBS&D)
9. Enable your Windows/Personal
Firewall and Disable windows
file/printer sharing unless
needed.
10. Back up important files. No
system is completely immune from
malicious attack or from a
hardware or software failure
that could unexpectedly and
suddenly destroy files.
11.
Never open attachments, even if
they appear to be sent from
someone you know or trust
without verifying that the
attachment was actually sent
from the specific person/company
- compromised computers can send
emails with malicious content
and those emails may appear to
be sent from the computers
owner/user.
|