Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Firewall is turned on
  2. Guest user is turned off
  3. Make sure remote file sharing to your machine is turned off
  4. Do not use the Internet. We cannot guarantee the security of any machine that has entered MECREEK unless the Internet on the computer stays off. Turn the WiFi off, do not plug an Ethernet cable into the laptop.
  5. Do not let anyone plug usb flash drives into your computer. If someone needs to give you a legitimate file, email the file or put it in Drop Box.
  6. Use only non-administrator accounts. If your account currently has administrator level access or privileges, create a new administrator account, log into that account, and remove administrator access from your main account. This way if your account is compromised, the attacker has no rights to start installing things willy-nilly.
  7. If suddenly your computer is asking you for permission to install something that you didn't tell it or expect to install, you should say no. This is a trick used by bad hackers to try to get you to install bad stuff that steals your data.

Mobile Devices

Just how vulnerable mobile devices can be is shown by the following news stories:

...

8) If you suspect your phone has been compromised, please contact your IT support professionals for assistance. If you're using an iPhone and have a recent backup in iTunes, you can perform a "restore" in iTunes which will return iPhone to factory settings, reinstall the current newest version of the iOS and restore the data and from backup. This should remove any unsolicited malicious installations.

 

Consumer Protection

1) When abroad, use cash, pre-paid money cards, or traveler's checks rather than credit cards.

...