16
Cyber Security Information Portal (www.cybersecurity.hk) Keep Your Personal Computer Safe for Windows User KEEP YOUR PERSONAL COMPUTER SAFE FOR WINDOWS USER 1 Use strong password for user accounts 2 Set up standard user accounts for daily use 3 Disable Guest account 4 Enable password protected screen saver 5 Use up-to-date anti-malware security software 6 Use personal firewall 7 Update operating system, application and browser 8 Configure basic security settings for web browser 9 Backup data regularly 10 Completely remove data before giving away or selling your computers

KEEP YOUR PERSONAL COMPUTER SAFE FOR WINDOWS USER · Keep Your Personal Computer Safe for Windows User ... in particular those for cloud backup. Please visit InfoSec website for more

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Cyber Security Information Portal (www.cybersecurity.hk) Keep Your Personal Computer Safe for Windows User

KEEP YOUR PERSONAL COMPUTER SAFE

FOR WINDOWS USER

1

• Use strong password for user accounts

2• Set up standard user accounts for daily use

3• Disable Guest account

4• Enable password protected screen saver

5• Use up-to-date anti-malware security software

6• Use personal firewall

7• Update operating system, application and browser

8• Configure basic security settings for web browser

9• Backup data regularly

10

• Completely remove data before giving away or selling your computers

Cyber Security Information Portal (www.cybersecurity.hk) Keep Your Personal Computer Safe for Windows User

Index

1. Use strong password for user accounts ........................................ 3

2. Set up standard user accounts for daily use.................................. 4

3. Disable Guest account ................................................................... 5

4. Enable password protected screen saver ..................................... 6

5. Use up-to-date anti-malware security software ............................. 7

6. Use personal firewall ..................................................................... 9

7. Update operating system, application and browser ..................... 10

8. Configure basic security settings for web browser ...................... 12

9. Backup data regularly .................................................................. 13

10. Completely remove data before giving away or selling your

computers ........................................................................................ 14

Disclaimer ........................................................................................ 16

Cyber Security Information Portal (www.cybersecurity.hk) Keep Your Personal Computer Safe for Windows User

3

1

Use strong password for user accounts

RISK

Weak password, which is easy to guess, increases

the chance of unauthorised access of computer.

CHECK ITEMS

Tool(s) available

Function: Assist users to learn and practice on how to create strong passwords.

Kaspersky Secure Password Check

Intel Grade My Password

System settings

Purpose: Create / change log in password of your computer and check whether strong password policy is enforced.

Steps on how to protect your computer with a password.

Steps on how to change your Windows password.

Steps on how to change password policy settings.

MORE TIPS

Change password regularly and use a password that is difficult to guess but easy to remember.

Don't reuse passwords or write down your password, particularly anywhere near the computer. Please visit InfoSec website for more good practices on Handling User Account and Passwords.

Cyber Security Information Portal (www.cybersecurity.hk) Keep Your Personal Computer Safe for Windows User

4

2

Set up standard user accounts for daily use

RISK

Malware can infect a computer and operate

malicious activities under the user rights of the

logged-in user.

CHECK ITEMS

System settings

Purpose: Create standard user account for your computer and

change user account's administrator right.

Steps on how to create a user account.

Steps on how to change a user's account type.

MORE TIPS

Use administrator account only where necessary, such as

managing other user accounts, installing or removing

software or changing security settings.

Use different passwords for different user accounts, in

particular those for handling private and sensitive data.

Cyber Security Information Portal (www.cybersecurity.hk) Keep Your Personal Computer Safe for Windows User

5

3

Disable Guest account

RISK

Guest account of computer can provide information

to attacker and increase security risks.

CHECK ITEMS

System settings

Purpose: Disable guest account in computer.

Steps on how to turn the guest account on or off.

MORE TIPS

Assess security risks before using guest account, which

allows users to log on to a network, browse the Internet,

and shut down the computer.

Establish a password for guest account before use because

the guest account password is blank by default.

Cyber Security Information Portal (www.cybersecurity.hk) Keep Your Personal Computer Safe for Windows User

6

4

Enable password protected screen saver

RISK

Unattended computer is susceptible to

unauthorised access to the system.

CHECK ITEMS

System settings

Purpose: Enable password protected screen

Steps on how to turn screen saver on or off.

Steps on how to use your Windows password for screen saver password.

MORE TIPS

Enable password protected screen saver in all time and do

not leave your computer unattended, in particular in public

area.

Default user inactivity time set for screen saver to launch is

usually 15 minutes; however a shorter time period can be

set for better security.

Cyber Security Information Portal (www.cybersecurity.hk) Keep Your Personal Computer Safe for Windows User

7

5

Use up-to-date anti-malware security software

RISK

Your computer is susceptible to virus, Trojan horse

and other malware attacks, which may lead to data

and financial loss.

CHECK ITEMS

Tool(s) available

Function: Detect malware attack and remove malware from

infected computer.

Windows Defender (Built-in software in Windows 8)

Microsoft Security Essentials (for Windows 7 and Vista)

BitDefender QuickScan

TrendMicro HouseCall

Other anti-malware security software

System settings

Purpose: Check whether your PC is protected with up-to-date

anti-malware security software.

Steps on how to know if my computer has installed

anti-malware software.

Steps on how to keep Windows Defender definitions

up-to-date.

Steps on how to schedule when Windows Defender scans

your computer.

Cyber Security Information Portal (www.cybersecurity.hk) Keep Your Personal Computer Safe for Windows User

8

Note: Please be aware that the exact process for applying the

security features will vary between different products. It is

recommended that users follow the instructions contained in the

official user manual where possible.

MORE TIPS

Enable auto-update features of the anti-malware security

software to keep the software and its definition up-to-date.

Enable real-time protection feature and perform full scan of

computer in periodic basis (e.g. weekly).

Stay alert to symptoms that might indicate a malware

infection, such as battery drain, performance clogging,

unusual large data usage, etc.

Be aware that fake anti-malware software and rogue

pop-up security alerts are popular ways for tricking users to

download malware onto their computers.

Cyber Security Information Portal (www.cybersecurity.hk) Keep Your Personal Computer Safe for Windows User

9

6

Use personal firewall

RISK

Networked computer is more susceptible to cyber

attacks because attackers can discover and scan

the computer remotely, connect to it and send user

data to external server.

CHECK ITEMS

Tool(s) available

Function: Enable firewall protection for your computer.

Windows Firewall (Built-in software in Windows)

Comodo Free Firewall

ZoneAlarm Free Firewall

System settings

Purpose: Check whether Windows Firewall is enabled and verify

the firewall rules.

Steps on how to verify that Windows Firewall is on.

Steps on how to allow a program to communicate through

Windows Firewall and remove a program from the list of

allowed programs.

MORE TIPS

Enable your personal firewall in all time, in particular when

connecting to the Internet.

Enable built-in firewall of home router to further protect your

computer and home network from cyber attacks.

Cyber Security Information Portal (www.cybersecurity.hk) Keep Your Personal Computer Safe for Windows User

10

7

Update operating system, application and browser

RISK

Computer with known security weaknesses is more

susceptible to malware infection and other cyber

attacks, in particular when connecting to the Internet.

CHECK ITEMS

Tool(s) available

Function: Detect outdated software, browsers and their plug-ins.

Check and Secure website (Detect outdated browser and

plug-in)

Qualys Browser Check (Detect outdated browser and

plug-in)

Windows Baseline Security Analyser (Detect outdated

operating system and application)

Nessus Vulnerability Scanner (Evaluation version) (Detect

outdated operating system and application)

System settings

Purpose: Obtain latest security patch update and check whether

Windows operating system and other Microsoft products of your

computer are up-to-date.

Verify whether my computer is up-to-date.

Steps on how to use Windows Update to keep your

computer current.

Cyber Security Information Portal (www.cybersecurity.hk) Keep Your Personal Computer Safe for Windows User

11

MORE TIPS

Enable auto-update feature of software product and

remember to restart your computer to finish installing the

updates.

Uninstall end-of-support software products or upgrade to

another software product that has security updates and

avoid performing sensitive operations, such as online

banking, from computer without security updates.

Cyber Security Information Portal (www.cybersecurity.hk) Keep Your Personal Computer Safe for Windows User

12

8

Configure basic security settings for web browser

RISK

Default settings in common web browsers may

allow execution of malicious code, cache of

sensitive information and password without the

owner's knowledge.

CHECK ITEMS

System settings

Purpose: Check whether the basic security settings of web

browser are adopted.

Steps on how to secure Internet Explorer, Mozilla Firefox

and Safari browser

Steps on how to secure Chrome browser – Phishing and

malware alerts, manage your website passwords, run or

block plug-ins, delete your cache data and disable Autofill

feature

MORE TIPS

Do not visit suspicious websites or follow the links provided

in those websites, as they may cause malware infection and

force a browser to download files without user's knowledge.

Logout application after use and clear browser cache, in

particular after performing sensitive operation, such as

online banking.

Cyber Security Information Portal (www.cybersecurity.hk) Keep Your Personal Computer Safe for Windows User

13

9

Backup data regularly

RISK

Data cannot be recovered in case of malware

infection, hardware failure and device loss.

CHECK ITEMS

System settings

Purpose: Backup and restore files and full system.

Steps on how to back up your files.

Steps on how to restore files from a backup.

Steps on how to create a system image backup.

Steps on how to restore your computer from a system

image backup.

MORE TIPS

Backup regularly and protect your backup data securely.

Test the restore procedures to ensure the backup data can

be restored.

Assess security risks before synchronising data to cloud

services and avoid automatic backup of sensitive data to

them.

Protect your online user account with a strong password

and enhanced authentication mechanism such as 2-factor

authentication if available, in particular those for cloud

backup. Please visit InfoSec website for more good

practices on Handling User Account and Passwords.

Cyber Security Information Portal (www.cybersecurity.hk) Keep Your Personal Computer Safe for Windows User

14

10

Completely remove data before giving away or

selling your computers

RISK

Data can be accessed or recovered by data

recovery applications.

CHECK

ITEMS

Tool(s) available

Function: Securely delete data in computers’ hard disk including

Solid-State Drive (SSD).

The following tools can securely delete data in magnetic hard

disk:

Darik’s Boot and Nuke (DBAN)

Windows Sysinternals – SDelete

Eraser

The following tools can securely delete data in SSD:

ATA Secure Erase

Secure Erase (HDDErase)

Intel SSD Pro Administrator Tool (Support Intel SSD only)

SanDisk SSD Dashboard (Support SanDisk SSD only)

Note:

Some secure deletion software in the market can securely

delete the entire hard disk or wipe free space. Read the

software license agreement and the instructions carefully.

Cyber Security Information Portal (www.cybersecurity.hk) Keep Your Personal Computer Safe for Windows User

15

A number of vendors of SSD provide detailed steps /

specific tool for secure data erasure in their SSDs drives.

As the implementation of secure deletion between

different manufacturers, you are suggested to contact the

product vendors for the technical details of sanitisation

procedure.

MORE TIPS

Data cannot be recovered after secure delete. If data need

to be kept, perform backup before erasing the data.

Please visit InfoSec website for more options for disposal of

computer equipment containing sensitive information.

In order to protect data, enable full disk encryption (e.g.

BitLocker) with strong password after purchase.

If the edition of Microsoft Windows does not provide full disk

encryption feature, users should employ other relevant

software to encrypt sensitive data with strong password.

Cyber Security Information Portal (www.cybersecurity.hk) Keep Your Personal Computer Safe for Windows User

16

Disclaimer

The health check settings here are proactive in nature and intended for

improving mobile device security, as they may change the user experience and

interfere with the functionality and utility of some applications. The exact

process for applying the security features during the health check will vary

between different products. It is recommended to follow the instructions

contained in the user manual provided at the official website of the

manufacturer where possible.

Users are also recommended to observe the Important Notices of Cyber

Security Information Portal and read the user agreements and privacy policies

of the security software and tools before download and use them.