Cybersecurity Tips Newsletter

April 2017 Volume 12, Issue 04

Digital Spring Cleaning

From the Desk of Thomas F. Duffy, Chair

Download:

Spring cleaning is almost a right of passage. With it we celebrate the renewal of life that occurs in nature each spring and eagerly await the exciting fun of summer. Traditionally, spring cleaning means cracking our windows and dusting, mopping, and vacuuming, but this year consider taking a few minutes to spring clean your digital life. Here are a few tips for home users for refreshing, renewing, and reinvigorating your cyber life.

Online Accounts

Just like your home, your online accounts can collect clutter and occasionally need a few minutes of care. Start by considering what accounts you have online for both work and home. Chances are your accounts include email, social networks, clubs and organizations, shopping websites, cloud storage accounts, and others. Do you need them all? Is there information in those accounts that isn't needed anymore, such as credit cards saved in your accounts with shops and old documents on cloud storage accounts? Are there accounts that you dont use anymore and can close, like that old email account you never check? Are you using the same password across any of these accounts that you could easily make unique and more secure?

Email Accounts

Speaking of email, is there information in your accounts that you can archive or delete? Many email providers have limits on mailbox sizes, and for security reasons it's always smart to limit what is available through your email account. On a side note, how many emails are in your inbox - are there any you can file into folders or delete? And when was the last time you cleared out your deleted items or trash folder? Can you set a rule that will automatically empty your deleted items or trash folder on a regular basis? Unsubscribe to recurring emails that no longer interest you.

Social Media

Just like everything else, it's a good idea to spring clean your social media accounts by taking a few minutes to review your security settings, friends and connections, and posts to make sure you're still comfortable with them. Is the information on your social networking and job websites, including Facebook, Twitter, Instagram, and LinkedIn, current? Do your security settings ensure that only the authorized individuals can view what you post? Do you still use or need all of the social media sites you are registered to?

Devices

Smartphones, tablets, laptops, and computers make our lives so much easier and here's your chance to ensure that doesn’t change! Delete unused apps and clear out any downloads you aren't using any more. Make sure your device requires a password, pin, or fingerprint to log-in. Check for old files that can be archived or deleted. (Don’t forget to empty the recycling/trash bin Then make sure your device's security software is working properly (you do have antivirus installed, right?) and all software is patched and set to auto-update.

Browser Settings

Web browsers need a bit of care, just like other software. Many browsers can store your passwords or autofill settings, but over time the data stored by the browser can accumulate, and this isn't a secure place to store your passwords. So take a few minutes to check your browser settings, clear out old data, and ensure your browser's security settings are still keeping you safe. In particular, make sure that autofill doesn't contain sensitive information and that you don't store your passwords in your browser. Do you need all of the browsers on your system?

Home Networks

Take another moment to look at what is on your home network and how you're connecting to the Internet. Make sure your home router is secured with a complex and unique password and that it's broadcast name doesn’t identify it as belonging to you. Additionally, setting up your wireless router to use a current encryption standard like WPA2 will greatly strengthen your home network security. This would also be a good chance to see if there are additional security features you can turn on or install, such as firewalls or antivirus software.

Back Things Up

Whether you save your files to CDs or DVDs, a cloud back-up service, or an external hard drive, spring cleaning is a good opportunity to make sure you have a complete backup of important files. No matter how you're saving those files, make sure you're saving the right files and that you can restore everything from your backup, since a backup that you can't restore from isn't useful at all!

Take Out the Trash

Last, but certainly not least, take out the trash. Literally. Are there old devices in your house or office that should be recycled? If so, many towns and stores support eCycling initiatives and will help you properly dispose of them. Just make sure to remove and shred/destroy hard drives and other components that may contain sensitive data!

By taking a few minutes to include these digital areas of focus in your spring cleaning plans, you can ensure that your data and devices are that much safer.

 

 

 

 

Provided By:

 

Macintosh HD:Users:crogers:Desktop:Style Guide:MS-ISAC_500.png

 

The information provided in the Monthly Security Tips Newsletter is intended to increase the security awareness of an organization's end users and to help them behave in a more secure manner within their work environment. While some of the tips may relate to maintaining a home computer, the increased awareness is intended to help improve the organization's overall cyber security posture. This is especially critical if employees access their work network from their home computer. Organizations have permission and are encouraged to brand and redistribute this newsletter in whole for educational, non-commercial purposes.

Disclaimer: These links are provided because they have information that may be useful. The Center for Internet Security (CIS) does not warrant the accuracy of any information contained in the links and neither endorses nor intends to promote the advertising of the resources listed herein. The opinions and statements contained in such resources are those of the author(s) and do not necessarily represent the opinions of CIS.