Safeguarding Your Personal Data

Computers and the Internet have become an important part of our daily life, enabling a wide range of services to home users such as communicating with friends and family, shopping, paying bills, storing personal photos and music. This convenience and inter-connectivity does not come without risk. Potential threats include viruses that could erase your entire system or hackers stealing  your credit card information.

By understanding the risks and combining some common sense rules with a little bit of technology, home users can safeguard their data from these threats and understand the needs for security controls at work. The following tips will help protect your data.

Back Up Your Data

Your hard drive may crash or you may ind that an infection has affected your computer so much that the operating system and applications need to be reinstalled.In cases like this it is best to have your important data backed up so you can restore your system without fear of losing your data. Below are some important steps you can follow:

  • Use your computer’s backup tools. Most operating systems provide backup software designed to make the process easier. External hard drives and online backup services are two popular vehicles for backing up files.
  • Back up data at regular intervals. Weekly backups are recommended.
  • Verify the data has been backed up.Backup media needs to be reviewed periodically to determine if all of the data has been backed up accurately.

Use Strong Passwords.

Passwords help protect your data. It is important to have a strong password for your computer, mobile device, and any other media used to store important and/or sensitive data. A strong password is at least eight characters that use a mix of upper case, lower case, and numeric or special characters. Each device should have its own strong password so that if one is compromised your others will stay secure.

Be Safe Online.

Below are a few helpful tips on how to keep safe on the Internet:

  • Keep your operating system updated/patched. Set it to “auto update.”
  • Use anti-virus and anti-spyware software and keep them updated.
  • Do no visit un-trusted websites or follow links provided by unknown or un-trusted sources.
  • Secure your transactions. Look for the “lock” icon on the browser’s status bar and be sure “https” appears in the web site’s address bar before making an online purchase. The “s” stands for “secure” and indicates that the communication with the web page is encrypted.
  • Keep your applications (programs) updated and patched, particularly if they work with your browser to¬† run multi-media programs used for viewing videos. Set these programs to “auto update.”
  • Block pop-up windows, some of which may be malicious and hide attacks. This may prevent malicious software form being downloaded to your computer.

Encryption

Encryption is a process whereby the data is scrambled and can only be read by someone with the “encryption key” to unscramble the data. Users should consider encrypting sensitive information. Some new operating systems include tools to encrypt data while others require the installation of encryption software.

Dispose of Information Properly

It is important to properly handle data erasure and disposal of electronic media (e.g. PCs, CDs, thumb drives) in order to protect confidential and sensitive data from accidental disclosure. Become familiar with the proper methods of sanitizing, destroying, or disposing of media containing sensitive information.

Before discarding your computer or portable storage devices, you need to be sure that data has been erased or “wiped.” Below are a few tips to assist in disposing of your data:

  • Read/writable media (including your hard drive) should be “wiped” using Department of Defense (DOD) compliant software. Software that meets DOD compliance standards can be downloaded from the Internet.
  • Shred CDs and DVDs. This type of media should be physically destroyed.
  • Media that does not have a need to be re-used or contains sensitive or private data that cannot be “wiped” should be physically destroyed.

These information security tips are provided by Iowa State Bank in partnership with the Financial Services ISAC. Organizations have permission and are encouraged to brand and redistribute this newsletter in whole for educational, non-commercial purposes. Iowa State Bank is an Equal Opportunity Lender. Member FDIC.

Leave a Reply

 

 

 

You can use these HTML tags

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>