Safe computing

Safeguarding the computer and the information stored is important, as the loss or theft of information can cause inconvenience and have financial and other consequences.

Simple steps to safe computing

  • Backup

    Make copies of your work files and store them in a separate location like file servers, external hard drives, or USB memory sticks.

  • Be Cautious

    Only execute or download files that are from known and trustworthy sources, as anti-virus software is not foolproof. Do not open email attachments in unsolicited emails and be wary of unsolicited emails requesting information or inviting you to click on a link.

  • Use Strong Password

    Passwords should be easy for you to remember, yet difficult for others to guess. Consider using a phrase, or the initials in a phrase. Strong passwords are typically at least 8 characters long, and include upper and lowercase alphabets, numbers and punctuation marks. Secure your passwords as these are used to authenticate your identity.

  • Consider a Firewall

    A firewall helps you specify which other computers on the network your computer may communicate with. This will avoid unsolicited connections to your computer. A firewall can also be configured to request for your permission before allowing applications to access the network or Internet. There are free software firewalls available for download via the Internet. A software firewall or hardware firewall device is strongly recommended for network or Internet connections that are active for long periods of time, for example, broadband Internet connections or wireless networks.

  • Apply Patches and Updates

    Computers administered by the University will be regularly updated to handle viruses and patches. If you administer your own computer, check with the relevant software vendors for information on updates and patches.

  • Anti-Virus Software

    Use a good anti-virus software on your personal laptop. Configure it to scan every file accessed through any source, e.g. Email, Internet, and disks. Occasionally, scan all disks for viruses and file errors.

  • Dealing with Unwanted Emails

    The University community can experience an increased influx of unsolicited or suspicious emails. You as students need to be increasingly cautious of such emails, as they aim to steal your electronic identity and use it to compromise your personal information, or access your computer system. Continue reading about unwanted emails.