[IS&T Security-FYI] Newsletter, February 22, 2008
Monique Yeaton
myeaton at MIT.EDU
Fri Feb 22 13:17:06 EST 2008
In this issue:
------------------------------------------------
10 Common Computer User Mistakes
------------------------------------------------
Technology may be changing at a lightning-fast pace, but one thing
remains constant: users make mistakes with their computers.
Sometimes, the mistakes are just slip-ups that could happen to anyone
(ourselves included). But other times, an avalanche of issues is
unleashed simply because a user didn't know any better. It may look
like they've done something dumb, but if we haven't taught them
better habits, we've done something even dumber.
To help your colleagues, students, friends, and family to understand
what can lead to problems with their computers, share this list with
them of what NOT to do:
1. Plug into the wall without surge protection.
A power outage or storm can interrupt the electrical circuit and can
physically damage your computer and the data it holds. Even something
as common as turning on an appliance that's plugged into the same
circuit can cause a surge. Always use a surge protector. Some cheap
surge protectors will only survive a single surge and may need to be
replaced afterward. Ideally, use a UPS (Uninterruptible Power Supply)
which has a battery that keeps power flowing, giving you time to
safely shut your computer down.
2. Surf the Internet without a firewall.
Not having a firewall puts you at risk for viruses and attackers. All
computers have built in firewalls that come with the operating
system. Make sure it's turned on and properly configured. To learn
more about desktop firewalls:
<http://web.mit.edu/ist/topics/security/firewall.html>
3. Neglect to run or update anti-virus and anti-spyware programs.
These programs can seem like a hassle to use, but they do work and
will work even better if updated with the latest virus definitions.
The malware that AV software detects, such as Trojans, worms,
viruses, can not only wreak havoc on your system, but can spread via
your computer to the rest of the network. Spyware can collect
information from your system without you knowing. VirusScan, the AV
software MIT recommends and provides free of charge, has anti-spyware
functionality integrated. To learn more:
<http://web.mit.edu/ist/topics/virus/>
4. Install and uninstall lots of programs, especially betas.
The more programs you install, the more likely you are to run across
ones that either include malicious code or that are poorly written
and cause your system to behave improperly or crash. Even if you
install only licensed, final-release commercial software, too many
installations can cause your system to slow down over time because
removing them does not always remove all remnants of their code.
5. Keep disks full and fragmented.
One of the results of installing and uninstalling lots of programs is
that it fragments your hard disk. Over time, saving and removing
files from your computer can cause data to be saved over various
"clusters" on the disk, making it harder and harder for the computer
to retrieve information for a file. It will slow down the program you
use to open that file and generally slow down your computer. To fix
this, you can use the disk defragmenter built into your operating
system. If your disk is too full, you can use a disk cleanup tool to
delete rarely used files and clear space on your disk.
6. Open all attachments.
It is tempting to open all attachments received in emails, but some
can contain viruses. Those that run code, with extensions
like .exe, .cmd, and others are extremely dangerous. Other files can
contain embedded macros, like .doc or .xls files. Even plain text or
graphic files (.txt, .gif, .jpg, .bmp) are not safe anymore because
file extensions can be spoofed (faked). Only open attachments when
they're from a trusted source or when you're expecting them.
7. Click on everything.
Clicking on links in emails and on Web pages can take you to Web
sites that have embedded ActiveX controls or scripts that can perform
malicious activities. Additionally, these links can take you to
inappropriate content such as pornography, pirated music or software,
or get you in trouble if you're using a computer at work. Think
before you click a link. Also make sure the URL (web address) hasn't
been spoofed. You can often find out the real URL by hovering over
the link without clicking it.
8. Share and share alike.
It's nice to share but when you're on the network, sharing can expose
you to dangers. One way to make sure you aren't sharing the files on
your computer inadvertently with the world, turn off file and printer
sharing**. This is especially a good idea if you're connecting your
laptop to a public wireless hotspot. Also ensure that your account
and the local administrative account have strong passwords (see weak
passwords below). One other risk to sharing is copyright
infringement. To learn more about copyright and safe file sharing:
<http://web.mit.edu/ist/topics/security/copyright/index.html>
9. Pick weak passwords.
Passwords protect access to information and administrative controls
on a computer. If stolen or guessed, accounts can be compromised and
computers can be taken over by a hacker. To learn more about choosing
a strong password:
<http://web.mit.edu/ist/topics/network/passwords.html>
10. Ignore the need for a backup and recovery plan.
Even if all the above suggestions are followed, an attacker may still
crash your system or your data may be corrupted or wiped out by a
hardware problem. Or maybe your computer was lost, stolen, or
destroyed in a fire or other catastrophe. This is why it is essential
that you always back up your important information and have a plan
for recovering from a system failure. Using a backup program with
scheduled backups, like TSM, stores your data on a network server
away from the computer itself. The data is the most important thing
on your computer. The operating system can be reinstalled and so can
applications, but it may be difficult or impossible to recreate your
original data. To learn more about TSM and backing up:
<http://web.mit.edu/ist/topics/security/backup.html>
[Source of this article: TechRepublic.com]
*Here's how to turn off file sharing: In Windows 98 or ME, open the
Network applet from the Control Panel, click on the File and Printer
Sharing button, and uncheck both. Windows 2000 or XP users should
right-click on Network Neighborhood and choose Properties. Find the
network card (labeled Local Area Connection by default), right-click
on it, and select Properties. Uncheck File and Printer Sharing for
Microsoft Networks. Repeat for additional network adapters. On Apple
computers, go to your System Preferences, select "Sharing" under
"Internet & Network" and under the "Services" tab make sure the
message says "Personal File Sharing Off" (default setting). If
sharing only certain services, click them on in the list.
If you have questions or need more information on securing your
computer at MIT, contact the Help Desk at computing-help at mit.edu.
=========================
Monique Yeaton
IT Security Awareness Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://web.mit.edu/ist/security
More information about the ist-security-fyi
mailing list