First page Back Continue Last page Summary Graphic
Identify the Threats
An understanding of the technology is important, but common sense is equally valuable in stopping potential security threats.
Define Authorized Access
- Physical access to computing facilities.
- Access to computers.
- Borrowing another users account/password (Training and Policy issues).
Identify the Risk of Information Disclosure
- Determine the value or sensitivity of the information stored on your computers.
- Encrypt password files.
- Use minimum 8 characters passwords (mixed alpha/numeric, upper/lower case).
- Change passwords on a regular basis.
- Dont forget laptops.