101 Continued - Best Practices
The 10 Steps - continued
- Web Browsers: - Know your web
browser. Check for known vulnerabilities, updates
and patches on a regular basis. The procedure will
depend upon the web browser you are using. Check
your vendors help files or website for more information.
Make a point of familiarizing yourself with your
browsers various security settings and how they
can improve your online security. For Microsoft
Internet Explorer, there are a few articles worth
For other browsers, see you vendors support pages.
To test your browser online, you can visit Browser
- Secure Wireless: -
- Firewall: - Firewalls are a protective
barrier between your computer and the outside world.
They generally come in two forms, software firewalls
and hardware firewalls. A good firewall will filter
unauthorized and potentially dangerous data from
the Internet while still allowing legitimate data
to reach your computer and should block unauthorized
data coming from your computer. These days,
whether you connect to the internet via dial-up
or broadband, you should always have a functioning
firewall. RSS Technologies
recommends Zone Alarm
(they also provide a free version for home users).
We also recommend a multiple-layer defense. For
example, if you are using a broadband connection
you should use a router/gateway with a built in
firewall and also run a software firewall on all
individual machines within your local network. Keep
- Backup data: - As a rule, passwords should
always be at least 8 characters long and consist
of some combination of all of the following: numbers,
uppercase letters, lowercase letters and special
characters. They should be random and hard to guess.
Change passwords regularly, at least every 90 days.
Never share passwords with unauthorized persons.
- Implement company wide enforced security policies: -
- Wipe data from old pc's: -
If you have any questions that need immediate resolution, please
feel free to contact us via email
or use our online form