Avoid Being Hacked

Hacking is a major issue, and hackers use many tricks in an attempt to access your data. There are steps you can take to protect yourself and your data from the most common hacking methods.

Anti-virus software (Norton, McAfee, Sophos, etc.)
SPAM
  • Most spam will not cause harm, however the best practice is to delete emails from unknown sources and those with attachments. If you reply or attempt to unsubscribe, this will confirm to the spammer that your account is active and in use.
Anti-spyware
  • "Malware" or "spyware" are terms used to describe malicious software that can be used to cause denial of service attacks or harvest sensitive data (credit card numbers, etc.) from your computer. These programs can cause you to receive pop-up ads and/or track your web surfing habits. Attachments can be harmful to your computer and can carry malicious viruses and malware. There are tools available, such as Spybot Search and Destroy or Ad-Aware, that scan your computer and identify malware and other harmful items. Once found, these programs give you the option to delete the items. These programs also need to be updated so that you have the most current versions.
Patches, security updates, etc.
  • Virus writers and hackers will exploit holes in programs to gain access to your computer. To keep your computer up to date with the latest security fixes and patches, visit http://update.microsoft.com/microsoftupdate on a routine basis. If are you running an Apple or Linux machine, be sure to check routinely for updates also.
 
 
Securing Your Computer and Personal Information
  • Passwords
    Everyone needs passwords for numerous applications, Web sites, and even to log on to computers. Passwords keep your data from being stolen by others. One of the easiest ways for someone to get to your data is to figure out your password(s). Here are some suggestions for creating a distinct password:
    • Make your password at least 7 characters long.
    • Include letters, numbers, and special characters such as @ or $.
    • Do not use information relevant to you such as names of relatives, pets, or special dates like birthdays and anniversaries.
    • Change your password every 3 to 6 months.
    • Do not write down your password. Memorize it.
    • Do not give your password to anyone. If you give your password to another person, you may be held responsible for any actions they commit. 
  • Protecting Your Data
    At some point, you have probably lost a document that you really needed. It is a good idea to make back-ups of your data from time to time in case you have the misfortune of losing a document. There are several ways you can do this without spending much time, effort, or money:
    • Backup to CD or DVD
      If you have a CD or DVD burner, you can make backups of your data. This is a quick, easy, and cheap way to save your files.
    • Backup to Network Share (Z: Drive)
      If you have a server or a network drive, you can store documents on your computer and also back them up to your network drive. This will store your documents in two separate locations.
    • Backup to Removable Media
      You can store documents on removable media such as USB drives (also known as thumb drives, flash drives, etc.) as a backup solution. These are good places to store your data, and since they are portable, you can take your data with you.
  • When Not In Use
    If you have to step away from your computer for a short period of time or if you are finished for the day, make sure that you secure the computer. There are three ways to do this:
    • Log off
      Logging off of your computer is especially important in public areas such as coffee shops, libraries, schools, etc. Logging off prevents anyone from using the computer under your username.
    • Lock your computer
      When you are leaving your computer for a short period of time, locking the computer will keep someone else from using it. To carry out this function press CTRL-ALT-DEL and click the "Lock Computer" button. This option is not available in the Winthrop computer labs.
    • Turn off your computer
      Turning off the computer is the most secure way to prevent unauthorized access. If the computer is not on, no one will be able to connect to it remotely and carry out any malicious actions.
  • Identify Theft
    You should adopt sound practices when using email and other forms of communication on your computer to protect yourself from identity theft. Never give out personal information such as your social security number, bank account numbers, or passwords. You are strongly advised against providing other personal information such as your home address and phone number.
 
 
Downloading Content

Knowing how to use your computer responsibly is important to protect both yourself and those arround you. P2P or peer-to-peer programs have made news recently across the nation. Suits are being filed against users regarding illegal activity such as improper music downloads. We strongly suggests that you do not use peer-to-peer programs.

Always respect copyright laws.  This includes printed and digital material.  Do not engage in illicit music, video, or movie downloads.  Please be aware that the infringement of copyrighted music, videos, or movies can be punished by up to five years in prison and $250,000 in fines. Repeat offenders can be imprisoned up to ten years. Individuals also may be held civilly liable, regardless of whether the activity is for profit, for actual damages or lost profits, or for statutory damages up to $150,000 per infringed copyright.

Also, please be advised that all telecoms and internet providers will notify the appropriate authorities whenever requests are made by the Recording Industry Association of America or any other legitimate enforcement or monitoring entity.

 
 
Social Networking (Facebook, MySpace, etc.)
Social networking through the use of such services as Facebook have become part of everyday life for many of us. These types of networks can be used to find others with common interests, share personal information, and communicate with friends. While cyber communities can be used in positive ways, it is important to use common sense and keep several key thoughts in mind:
  • The information you place online can influence your future. Pictures that may demonstrate behaviors that are questionable or suggestive can be viewed by anyone on the Internet, including possible future employers. There have been instances where graduates have had their Facebook page called up during the interview process.
  • Making your information private does not mean that others are unable to view the material. Hackers have many tricks that enable them to view what is thought by you to be off limits. You should also remember that pictures or other information posted for a short period of time and then removed by you may have been downloaded by others and exist in cyberspace for years to come.
  • Be safe. Use common sense when entering information on Web sites. There is the illusion that your information is there for only your friends to view but realize that your information can be passed on to others that may not have your well being in mind. It is strongly suggested that you do not post information such as phone numbers or your place of residence.
  • Think about how you represent yourself and others. It is not only important to take note of what you say about yourself online but equally important are the comments you make about others. You do not want to face alleged violations that claim inappropriate behavior on your part.