laitimes

Information Security Awareness Talk - Personal Computer

author:Xining emergency
Information Security Awareness Talk - Personal Computer

-Document Storage-

Information Security Awareness Talk - Personal Computer

Hidden danger analysis

The hard drive of a laptop can be detached, and once lost, an outsider may bypass the operating system password and read the data on the hard drive directly. If you save important data to an encrypted disk, you can only read the file after entering the password, which can effectively prevent information leakage.

Security recommendations

It is strictly forbidden to handle and store state secrets on personal computers; it is recommended to save important documents on an encrypted disk and set complex passwords; mailboxes and instant messaging software may contain sensitive information, so it is recommended to set the data files and chat history directories of mailboxes on encrypted disks.

-Password Setting-

Information Security Awareness Talk - Personal Computer

Hidden danger analysis

Attackers often use automated tools to crack passwords, and may create a password dictionary for the target organization. Once you use a weak password, or use public information such as the name of the organization or the name of the individual as the password, the chance of being cracked is very high.

Security recommendations

It is recommended to use a strong password with a mix of uppercase letters, lowercase letters, numbers, and special symbols, and it is recommended that the length of the password be greater than 10 characters, and it is recommended that the password should not include public information such as name, birthday, mobile phone number, and organization name, and it is recommended that you change the password regularly (for example, every 30 days).

-Password Rating-

Information Security Awareness Talk - Personal Computer

Hidden danger analysis

Security varies from system to system, and if the same password is used everywhere, an attacker could try to log in to another system if something goes wrong somewhere.

Security recommendations

The safest way is to set a different password for each website or system; if you are worried about forgetting, you can set a basic password first, and then add the respective code names of different websites/systems at the end, or set different passwords for accounts with different levels of importance; pay attention to the relevant news of the website or system, and change the password of all locations that use this password as soon as an attack occurs.

-Software Downloads-

Information Security Awareness Talk - Personal Computer

Hidden danger analysis

Attackers may bundle malicious programs with legitimate software and set them to run in the background, making it difficult for users to detect problems once they download and use them. For example, if you are infected with a malicious mining program, it will seriously consume the CPU or GPU resources of your computer, causing problems such as slow running speed.

Security recommendations

It is recommended to search the official website of the software first, download the genuine software from the official website, the search engine results may contain commercial promotion, so do not blindly believe the top download address, if you can't confirm whether it is the official original software, you should use an online virus detection platform for testing.

-Security Updates-

Information Security Awareness Talk - Personal Computer

Hidden danger analysis

Operating systems and software inevitably have vulnerabilities, and security updates are the way to fix them. After a patch is released, attackers may exploit vulnerabilities to launch attacks before users have time to patch them, as was the case with the WannaCry ransomware outbreak.

Security recommendations

It is recommended to enable the automatic update function of the operating system and various application software, or pop up a prompt when there is an update, and update it as soon as the patch is released to confirm whether the update is successful.

-File Deletion-

Information Security Awareness Talk - Personal Computer

Hidden danger analysis

When it comes to file deletion or emptying a disk, you can't just empty the Recycle Bin or just use the Quick Format feature because the data on the disk isn't actually deleted, so you can also use a professional tool to get it back.

Security recommendations

When deleting a single important file, it is recommended to use the "file shredding" function that comes with the antivirus software, which can be seen by right-clicking on the file, and when clearing the disk where important files have been saved, you should not just rely on the formatting function, you need to use a professional erasing tool, or use other files to fill the entire disk after formatting and repeat it many times.

Source: State Secrets Bureau website

Producer: Ma Jiyu

Editor-in-charge: Zhang Yajiao

Editor: Xu Jing

Read on