Page 1
Page 2
Page 3
Page 4
Page 5
Page 6
Page 7
Page 8
Page 9
Page 10
Page 11
Page 12
Page 13
Page 14
Page 15
Page 16
Page 17
Page 18
Page 19
Page 20
Page 21
Page 22
Page 23
Page 24
Page 25
Page 26
Page 27
Page 28
Page 29
Page 30
Page 31
Page 32
Page 33
Page 34
Page 35
Page 36
Page 37
Page 38
Page 39
Page 40
Page 41
Page 42
RealMoney101www.hesaa.org21ComputerSecurityTips1.Limitstorageopersonalinormationonyourcomputerathomeoryourbusiness.2.AteryouleyourtaxesusingyourcomputerandathirdpartysotwarelikeTurboTaxprintacopyoryourrecordsandremovetheleromyourcomputer.3.Passwordmanagementpracticesmustincludestrategiesormaximumpasswordprotectionandcomputersecurity.Suchstrategiessuggestusinguniqueeasy-to-rememberandhard-to-guesspasswords.4.Assignapasswordtoeachuserothesamecomputertolimitaccesstosensitiveareas.5.Donttakethecomputeraroundtopublicareasvacationsorbusinesstripsiyoudonthaveto.Whenandiyoudomakesurethecomputerisinyourpossessionatalltimes.Forexamplewhenyoutakeyourcomputertoacamakesureyouhavesomeoneyoutrustwatchoveryourcomputeriyouhavetogotothebathroom.6.Dontleavethecomputerinyourcar.7.Dontdisposeoyourcomputerwithoutrstmakingsurethatallsensitivecontentsareclearedromthecomputer.8.Dontshareyourpersonalcomputerwithothers.9.IyouhavetouseyourcomputerorstoringpersonalandnancialinormationthenavoidusingthatsamecomputertoconnecttotheInternet.10.Installanti-virussotwareandupdateitregularlyasup-datesbecomeavailable.Computervirusescandestroyacomputeranditsdataandwormscanleadtoinormationthetandemailspoong.11.Useapersonalrewallonyourlaptop.Althoughsomeoperatingsystemscomewithapersonalrewallyoushoulduseagoodthird-partypersonalrewalltosecureyourcomputerandpreventintrudersromhackingbackyoursystem.Thissotwareisusuallyinexpensiveandeasytoinstall.12.Applypatchestotheoperatingsystemsastheybecomeavailable.Thiscouldbedoneautomaticallybycertainoper-atingsystems.13.Usesotwaretoencryptyoursensitivelesandimproveyourcomputersecuritycontrolssoevenithecomputerisstolenthestoredinormationwouldbeuseless.14.Haveaplantopreventlaptopthetorlossprotectyourmobiledeviceanddealwithitsthetorlosswhenitoccurs.15.Developcommunicateenorceandmonitoracomputersecuritypolicyoryourbusinessoryouramily.16.Educateyouremployeesamilymembersriendsagentsaccountantsattorneysandotherswithwhomyoudobusi-nessorallowhandlingoyoursensitiveinormation.Makesureeveryoneisawareotheidentitythetrisksandhowtheycanhelpdeterthisthreat.17.Recognizeanddeletewithoutopeningspamemailswhicharejunkunwantedorunsolicitedemailspotentiallycon-tainingmaliciousprogramsandinormation.18.Createanduseyouronlineaccountscareully.19.PhishingisoneothelatestInternetscamstolurevictimsintogivingawaytheirpersonalinormation.Dontallvic-timtophishingscams.20.WhenaccessingtheInternetespeciallyoronlinebankingandbillpaymentalwaysusetrustedcomputerssuchasyourofceorhomecomputer.IdentityTheft