computer and physical security recommendations. assure that computers and work locations are secured...

12
Computer and Physical Security Recommendations

Upload: jesse-barrett

Post on 17-Dec-2015

213 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Computer and Physical Security Recommendations. Assure that computers and work locations are secured when work areas are not staffed.  Log-off or lock

Computer and

Physical Security

Recommendations

Page 2: Computer and Physical Security Recommendations. Assure that computers and work locations are secured when work areas are not staffed.  Log-off or lock

Assure that computers and work locations are secured when work areas are not staffed.

Log-off or lock your PC’s screen when you leave the immediate work area…

Meetings, Breaks, Lunches, End-of-the-day…

Shut Down PCs at the Close of Business each day…

Assure that work areas are kept locked…

Page 3: Computer and Physical Security Recommendations. Assure that computers and work locations are secured when work areas are not staffed.  Log-off or lock

Don’t allow NON-STAFF persons to use STAFF PCs or workstations

Student Casual Workers Children or Family members Visitors Friends Unknown persons ???

Page 4: Computer and Physical Security Recommendations. Assure that computers and work locations are secured when work areas are not staffed.  Log-off or lock

Know who is accessing the STAFF PCs around you.

Question anyone who comes in to FIX, UPGRADE, REPAIR or REMOVE any computer equipment.

If you are un-sure if the Repair Person is Genuine STOP THEM… Call the ITS Help Desk to verify their identity Locate Online Photos of ITS Technical Staff

at the ITS: Tech Services Web Page

Report any un-authorized access immediately to your Supervisor or Dean and the ITS: Help Desk…

As a last resort if you are unable to verify the identity of any repair person immediately - Call Campus Police …

Page 5: Computer and Physical Security Recommendations. Assure that computers and work locations are secured when work areas are not staffed.  Log-off or lock

Beware of what files you store on your PC.

NO - Confidential information

NO - Disciplinary information

NO - Personal <or> Private information

NO - Unauthorized Software

Page 6: Computer and Physical Security Recommendations. Assure that computers and work locations are secured when work areas are not staffed.  Log-off or lock

Safely Store Back-up CDs or Data Diskettes away from harm…

Use a Sturdy diskette storage box

Lock the Storage Box in a Secure Storage Location <or> Locked File Cabinet

Never store diskettes or CDs out in the open…

Page 7: Computer and Physical Security Recommendations. Assure that computers and work locations are secured when work areas are not staffed.  Log-off or lock

Dispose of Diskettes CDs or Backup tapes correctly.

Re-format <or> Destroy all data diskettes or CDs before throwing them away…

Break the diskette cover and remove the disk

Cut up the disk or CD with scissors to assure destruction

Safely throw away all parts

Page 8: Computer and Physical Security Recommendations. Assure that computers and work locations are secured when work areas are not staffed.  Log-off or lock

Safeguard any Original Software CDs, Manuals or Licenses

Store in a Locked Secure Location

Record any License Numbers

Don’t loan out software to others…

Page 9: Computer and Physical Security Recommendations. Assure that computers and work locations are secured when work areas are not staffed.  Log-off or lock

Maintain the Antivirus Software for your PCs

Assure Antivirus Software is loaded and operating on your PC

Setup the Antivirus Software to automatically update the scanning data files - Daily

Check the Antivirus Program and Data Files – Weekly

Scan your Computer for Viruses – Twice a week

Updates for the McAfee Software is available on the

ITS: Tech Services Web Page http://

www.elcamino.edu/administration/techservices

Page 10: Computer and Physical Security Recommendations. Assure that computers and work locations are secured when work areas are not staffed.  Log-off or lock

ITS: Technical Services Web Pages

Online Work Orders for Computer and Audio Visual Repairs

Antivirus Software Updates

ITS: Technical Staff Pages Names, Photos, Email Addresses, Phone Numbers…

Computer and Printer Hardware Recommendations

Access to Software and Hardware Vendor Web Pages

http://www.elcamino.edu/administration/techservices

Page 11: Computer and Physical Security Recommendations. Assure that computers and work locations are secured when work areas are not staffed.  Log-off or lock
Page 12: Computer and Physical Security Recommendations. Assure that computers and work locations are secured when work areas are not staffed.  Log-off or lock