Saturday, October 25, 2014

Search Courses
Advanced Search
Send Us a Note

 

Surprisingly, basic safety is often ignored by people using the Web to research information quickly and efficiently. If you use the Internet for research of any kind, you could be exposing yourself and your company to hidden dangers such as the unauthorized transfer of confidential information. And no one wants to be the person responsible for a companywide computer network shutdown.

Whatever your reason for using the Web, there is a smart way to conduct research on it: with an alert eye and a vigilant approach. Use these four tips to help protect yourself and your company from prying eyes and malicious programs.

1. Update, update, update!
Microsoft continually provides enhancements and security updates to all its products, including Internet Explorer. No program is completely safe from harm but as threats are discovered, Microsoft makes fixes, upgrades, and service packs for its products available. To maintain the highest level of security on your computer, you or your IT department must make sure to apply all service packs.

Before you venture onto the Web, make sure you are using the latest version of Internet Explorer. At the time of this writing, the latest version for Windows XP is 6.0.2, with Service Pack 2 applied. A service pack is a free update to a Microsoft software program that contains fixes and enhancements. To see what version you are using, follow these steps:

  1. In Internet Explorer, on the Help menu, click About Internet Explorer. There are three items you should notice in the window that is displayed:
  • Version: Internet Explorer 8.0 is the latest version.
  • Cipher Strength: This is the level of encryption that the browser can support. If you are going to be sending any confidential information over the Internet, you must make sure the cipher strength is 128-bit. If it is less than this value, it will be possible for a hacker to crack the encryption code and view confidential information.
  • Update Versions: Keep your version updated to ensure the balance between security and functionality is correct.


Make sure you are using the latest version of Internet Explorer

2. Click OK to close the window

If your browser needs updating, go to the Microsoft Update Web site, where you can download the latest version of Internet Explorer.

2. Get into the zone
By setting up Internet zones to meet your personal needs, your computer can help protect you as you surf the Web. A zone is a logical region or grouping of Web sites, based on where they are physically located and how well you trust the source. These default zones are available in Internet Explorer 6.0.2:

  • Local Intranet - Web sites located on your local network. These sites do not have to communicate over the Internet to be accessed.
  • Restricted Sites - A list of Web sites that are known or suspected to be harmful to your computer.
  • Internet - All other sites that don't fall under the other three categories.

    You can indicate how Internet Explorer should behave when it accesses a Web site within each of these zones. In Internet Explorer, on the Tools menu, click Internet Options. In the Internet Options dialog box, click the Security tab.
    Trusted Sites - A list of Web sites that you trust not to harm your computer, such as sites you have identified as properly encrypted.


Setting up Internet zones can help protect you.

When you select a Web content zone, you can change the security levels. For all but the Internet zone, you can add specific sites to a zone based on your personal requirements. And Custom Level allows you to enable or disable a variety of options based on personal preference. For example, you may want to allow automatic logons only to Web sites that are located in your Intranet zone instead of everywhere on the Internet. The User Authentication section of the Custom Level zone allows you to set that preference. Or, you may want to ensure your Pop-up Blocker is enabled. Custom Level is where you can ensure your security settings allow your blocker to operate.

Follow the prompts in the Internet Options dialog box in the zone you want to customize by either clicking Sites or Custom Level.

3. Limit your intake of cookies
Cookies are small files stored on your computer that contain information needed on certain Web sites. A cookie can be used to store user ID, password, preferences, personalization, or other information that is helpful to enhance your experience on that site. For example, suppose you visit a Web site that allows you to select a preferred language. So you don't have to choose the language preference each time you enter the site, a text file on the site stores language preference directly on your computer as a file, or cookie.

Here's the catch: you don't know what the cookie has been programmed to collect. You don't know if the cookie is malicious or not. If it's malicious, you could quickly end up with a spiteful little program stored directly on your hard drive. A malicious cookie can collect and store almost any information that you may not want it to, such as your name, credit card information, address, or more. Cookies make it possible for unwanted information to be stored and accessed repeatedly when you visit a Web site.

By default in Internet Explorer, cookies are allowed for all zones except the Restricted Sites zone. However, if you want to limit cookies for a particular zone, here's how you do it:

  1. In Internet Explorer, on the Tools menu, click Internet Options. In the Internet Options dialog box, click the Privacy tab.
  2. In the Settings section, move the slider up or down to adjust the settings.



    Moving the slider up incrementally increases the Internet security on your computer, so that cookies are not accepted. Moving the slider down incrementally decreases the security, so that cookies are accepted. Check with the IT department for your organization if you are not sure which settings are appropriate to use.
  3. Also in the Settings section, click Sites to explicitly set a cookie policy for individual Web sites. Here, you can specify which sites you want to allow or not allow to use cookies. Enter the desired Web site address in the Address of Web site text box. Click the Block button to block all cookies for the entered site, or the Allow button to allow all cookies for the entered site. 
  4. Continue entering settings for each specific Web site for which you want to set a cookie policy.
  5. Click OK to return to the Internet Options dialog box. Click OK.

If you are concerned that you may already have cookies on your computer that contain personal information, you can delete them by following these steps:

  1. In Internet Explorer, on the Tools menu, click Internet Options
  2. Make sure the General tab is selected. (This is the default.) 
  3. In the Temporary Internet files section, click the Delete Cookies button. You will be prompted for confirmation before continuing.
  4. Click OK.

4. Check for encryption before entering information on a site
While surfing the Internet is less dangerous than finding an abandoned bag in an airport, security should still be taken seriously. Encryption is a method that Web site owners use to help protect sensitive information, such as user names, passwords, addresses, phone numbers, and credit card numbers. If a Web site you visit does not use encryption, any sensitive information you place on it is easily accessible to hackers who want that information for unsavory purposes.

There are two ways to ensure you are viewing an encrypted site.

  • Make sure you are using the latest version of Internet Explorer as outlined in Tip 1 ("Update, update, update!") above. 
  • Make sure that a Web site uses encryption when you are entering or viewing sensitive information. There are two ways to see whether a site uses encryption. One is a small yellow "lock" icon on the status bar of Internet Explorer. The other is in the Web address itself. If it begins with https:// (note the "s"), then the site is secure. If you ever visit a Web site without either of these encryption indicators, do not click a Submit, Save, or OK button, because sensitive information will be transmitted without being encrypted.

Source: http://www.microsoft.com/atwork/default.aspx

  

Chat with a live 
Solutions Executive

Live chat by SightMax

Call us today 
about how we can assist you 
with your learning and 
development needs.

416-929-1599
info@acend.com

 


Privacy Statement  |  Terms Of Use
Copyright 2010 by Acend Corporate Learning