#06# on your phone’s keypad, and it will display a 15 digit number. Make a record of that number, it is your International Mobile Equipment Identity (IMEI) number; and, if the phone is lost or stolen, the phone can be identified even if a new SIM card is added. Your provider can also block others from using the phone on their network, which could help protect you against expensive 1-900 phone calls and similar mischief.
May 14, 2013
Effectively delete files When you delete a file, depending on your operating system and your settings, the file may be transferred to your trash or recycle bin. This “holding area” essentially protects you from yourself—if you accidentally delete a file, you can easily restore it. An unauthorized person will also be able to retrieve it. Does your recycle bin include credit card information, passwords, medical, or other personal data? Is there sensitive corporate information? Empty the trash or recycle bin on a regular basis to ensure that deleted information stays deleted. May 13, 2013
Don’t pass on chain messages or send warnings to everyone you know Chain messages are a burden on mail systems and to the vast majority of the people who receive them. Just don’t pass them on — it is as simple as that. You may get messages from friends, warning you about a new virus, health scare, charity appeal or con trick. These are very likely to be hoaxes or just plain wrong. Be very suspicious of messages that ask you to pass them to “everyone you know”. That leads to an endless chain of forwarded messages that go on long past any real or imagined threat. If it is really convincing, pass it to your IT section or helpdesk for them to consider. May 12, 2013
What you ask people walking around inside your company offices without a valid identity card: “May I help you?” Security comes before a false sense of social etiquette. If you see someone anywhere on your office premises whom you don’t know, and who doesn’t have a valid ID, go ahead and ask the question. You can’t be too alert.
Submitted by Nitin Dewan May 11, 2013
Never respond to an email asking for personal information Companies you do business with should never ask for account information, credit card numbers or PIN information in an email message. If you have any questions about an email you receive that supposedly comes from your financial institution, call the local branch office. Do NOT respond to the email. May 10, 2013
Patch and update on a regular basis Because hackers are constantly looking for vulnerabilities, it is important to keep your software up to date and patched. Unpatched, out-of-date systems are a leading cause of security incidents. Take the time to ensure you have the most recent patches and updates installed. May 9, 2013
See just how “Security Aware” you really are Do you believe you’re a little more Security Aware? Can you identify the threats that exist in your environment and the steps you should take to avoid them? Take the following quizzes and find out. Phishing http://www.onguardonline.gov/games/phishing-scams.aspx Spyware http://www.onguardonline.gov/games/beware-spyware.aspx Identity Theft http://www.onguardonline.gov/games/id-theft-faceoff.aspx Social Networking http://www.onguardonline.gov/games/friend-finder.aspx May 8, 2013
Protect your home wireless networks No matter how friendly you are, you wouldn’t let your neighbor read your bank statements and private letters. If you have a wireless network in your house and don’t protect it, you could be doing just that. As they come “out of the box”, most wireless networks let anyone in range connect to them and that could also let them see your PC and your email. It is worth taking a few extra minutes when setting them up to enable the encryption settings. Briefly, if you don’t understand the jargon, WPA is better than WEP. May 7, 2013
Don’t be an unintentional spammer If you’re like most people, you’ve probably received at least one hoax or chain letter in your inbox. What should you do with the next one you receive? Delete it! Why you ask? Because chain letters and hoaxes have the potential to cause problems (lots of network traffic or just filling up someone’s inbox) and they can also be very annoying. Visit the following sites to find out more about hoaxes and chain letters.http://www.snopes.comhttp://www.breakthechain.orghttp://hoaxbusters.ciac.org May 6, 2013
If you print it, go get it right away! Dont leave important, sensitive, or confidential material lying around the office. Common printing areas are frequented by people coming and going. Often you will be in line to pick up your documents and others may handle them before you. This leads to unnecessary information disclosures. One boss had a print job disappear, and had e-mailed the whole floor about it. The pages never turned up. Always use the closest print station, or a dedicated printer for confidential information, and go get it right away! May 5, 2013
Watch out for shoulder surfers Watch out for shoulder surfers who read over your shoulder or try to steal your password. If you have your back to the door or an open cubical wall, get a rear view mirror to stick up and watch behind you when youre typing. This also prevents office pranksters from sneaking up on you. When in public places, such as Internet cafes, always try to sit with your back to a wall to prevent onlookers. Glass walls dont count — thieves can look right through them! May 4, 2013
Don’t enter your password on an untrusted computer. A password is only as secure as the computer or network it is used on.
Bad Guys target public kiosk-type computers and wireless networks, such as those in Internet cafes, conference centers, hotels and motels, and airports. The instant you type your password on a computer that is infected or rigged, or on one using a compromised wireless network, the Bad Guy has got that password for good. This is one reason why you should change your passwords on a schedule, and never reuse a password on several computers or systems. Regard all public-use computers as untrustworthy. If you have no choice but to use a public computer, change your password before you log off or at the next available opportunity. May 3, 2013
Use Outlook? Use the Auto-Preview, not the Reading Pane If you are using an older version of Outlook, or if you have managed to reset the security level for e-mails, then you may be at some risk for HTML script-based exploits. Auto-Preview displays the first three lines of the message, enough to identify whether the message is valid, and it displays faster. Here is how to use it.
Disable the Reading Pane and Enable Auto Preview: Open Outlook. Choose View -
View the Original article