It very important that you maintain your server and/or desktop so that it is as secure as possible. Having your computer compromised can threaten you and others on the network. When a computer is compromised the following is possible:
- Your personal identification information can be stolen
- Other's personal identification information can be stolen
- Your computer can be turned into a SPAM system
- Your computer can stage various internet attacks (e.g. DoS- Denial of Service)
- Passwords can sniffed on the network
- Spyware/Trojans/Netbots can be put in place and difficult to detect
- The local network you are on could be disabled
Basic steps you need to take:
- Install virus software (download Sophos here)
- Keep your computer patching up to date
- Top 10 things you should do or not do (Top 10 Good Practices)
- UCSC minimum Connectivity Requirements (Minimum Network Policy)
Also, make sure that you are handling documents, files and data properly:
Restricted Data = UCSC’s most sensitive information.
- Social Security Numbers (SSN)
- Driver's license and state ID card numbers
- Financial account and credit card numbers
- Personal medical and medical insurance information
- Other info with a similar level of sensitivity or risk
Common places where restricted data may be found:
Restricted data requires the highest level of security.
- Always access securely. Use eduroam or Campus VPN when you’re on wireless.
- Don’t store on local devices (phones, laptops, desktops, etc.).
- Don’t email, text, or post it online.
- Don’t store in Google or other cloud/online services.
- Only share with authorized people. Restricted data is protected by law. Unauthorized access must be reported.
Online Tools to Test your Computers Security