Network Security applies both to the information stored on computers and information sent over the communications network, since these networks are used to share important data, and that’s why having an unified communications solution could be the best option to be secured. This chapter provides information about computer security:
Keywords for Use in a Note on Computer Security
If you have not already done so, you should:
Install anti-virus software. If this does not deter you from visiting the Internet, contact your anti-virus software vendor and ask them to remove security software from your computer. Note: Some anti-virus software is free, and some is paid.
Also see the Secure Windows site for tips on avoiding viruses.
See the Microsoft Security Page for information on the Microsoft Anti-Virus Program.
Run a security scan on your computer. This helps to find and remove viruses.
Avoid using public computers if you can. They may not be properly protected.
If you need to do business with other people, use a private computer.
If you can’t run security software, install it (see the preceding section), and run a scan.
Use Windows Gateways or remote access tools to connect to your computer.
Be alert to phishing. Be very alert.
Be aware that telephone scams send out an impersonated caller. Don’t answer the phone, either.
Scan for viruses and worms with free antivirus software (such as the free Microsoft Security Essentials).
Note: For information about updating your anti-virus program, see Microsoft Security Essentials.
Review the security and anti-malware definitions in the International Computer Virus Association (ICVA). This is an organization of people working with computer security. The Internet is one of the places where computers are used. These people have the technical knowledge and the understanding of the computer system and the Internet. The ICVA is the organization that defines how antivirus and other computer security software should work and what it should prevent. ICAV has a Code of Practice that describes the responsibilities of ICAV members when it comes to computer and network security. The organization also has a Security Objectives Statement and Guidance, which describe the policies and objectives of the organization.
Keep your personal information in one place, if possible. Make it easy for others to find it. Include email addresses, names, and email addresses of every important person and organization. Use.HTM files to give each person’s email address and a name to use in addition. Many Web sites also support user accounts in.HTM files. Consider what you will do when your computer is stolen. You might want to use your own email address and a name that will be remembered, not the name your Web site would give you.
The Privacy Rule restricts the security measures taken by businesses, except when the business object to the privacy measures. For example, a credit card company cannot tell you how it handles credit card information. Other businesses, such as banks, must comply with the Privacy Rule. See chapter 3, “Information Security for Businesses,” for more information.
Online Internet use increases the risk of identity theft.
The risk of identity theft is much greater on the Internet. An e-mail address is often a combination of your name, address, and phone number, creating easy access for someone who can identify you.
When you log on to an Internet site with your real name or account number, you risk being identified as an author or poster and perhaps asked to create a password. In some instances, your employer may demand an extra security measure, so they know your data is not being stolen.