Skip to main content
x

General Recommendations

The following are recommendations for steps you can take to improve your computer security, stability and operational health for a more stable computer working environment.

  1. Backup your system
    Backup your important data periodically and store the data/media separate from your system's hard drive. It can be as simple as copying important files from your hard drive to a floppy, CD/DVD, JumpDrive, or network drive. Ideally, the backup media should be stored in a location away from the system to allow data recovery even after a catastrophic loss (i.e. fire) to the computer. Users are responsible for backing up their own data.
  2. Use a firewall
    A firewall is a device/application used by networks and Internet users to defend computers from outside attacks. There are various firewall packages available (many of them free for personal use) such as ZoneAlarm, as well as paid applications from Norton and McAfee. Firewalls can protect networks and personal computers from attacks on packet traffic, ftp and telnet applications and use technologies such as a proxy server which hides the IP address of a network or personal computer.

    Individual firewall protection in a Business/Enterprise environment (like the HCC and the University networks) is normally not required because a properly configured business network will already have a firewall installed on the network. ACU normally disables the Windows XP firewall on each machine. However, ALL personal systems that operate outside of the university and college networks should be protected by a firewall (hardware or software) if you surf the Net or are on a network with multiple machines. Be aware that Windows XP Firewall (installed as part of XP SP2) is minimally effective in an open environment, but is still better than no protection at all. Also, be aware that a firewall does no good if you regularly allow connections thru without being absolutely sure that the connection is secure or if you regularly accept conditions to proceed when your firewall issues a warning.
  3. Install anti-virus software
    Keep it updated and run it regularly. (At least weekly; more often if you receive lots of email, notices or surf the net extensively.) Active staff and students of HCC can request 1 license for a personal computer at home. (RESTRICTIONS APPLY: Please see http://www.hawaii.edu/antivirus/mcafee.html
  4. Install a spy ware scanner
    Keep it updated and run it regularly. (At least weekly; more often if you surf the net extensively.) College/University-based computers can install SPYWARE SWEEPER on your computers through the University’s site licensing. This license does not include home computers, but there are free solutions available. (Please see: http://www.hawaii.edu/askus/670)
  5. Keep your system updated
    This includes high-priority system updates from Microsoft (i.e. Microsoft Update or http://update.microsoft.com) and application updates to ensure the latest security and performance improvements are installed on your system. Using the “Custom” selection of Microsoft Updates may also provide you a quick way to update some of your hardware drivers and improve the reliability and performance of some devices connected to your system. PLEASE NOTE: System performance may degrade during the scanning/update process. Be sure to update your virus and spyware definitions files regularly (at least weekly) so your is able to look for the latest releases of viruses and worms. ACU periodically reviews campus computer systems and brings them current with necessary system updates.
  6. Use a surge protector or UPS
    Power surges and brown-outs are deadly enemies of electronic equipment like computers. Protect your equipment by using a surge protector (not just an extension cord). A UPS provides even more protection by leveling power spikes and providing battery backup power in the event of full power loss allowing you to shutdown gracefully and minimizes file corruption.
  7. Use and protect your passwords
    Use “strong” passwords that are at lease 8-characters in length and are a combination of letters (upper and lowercase), numbers and special characters. (i.e. paS$worD975) This makes it harder for potential hackers to “crack” your password. Don’t use repetitive numbers (i.e. “11111111” or “12345678”) or leave your password visible in the open (i.e. taped to your monitor). Beware of “phishing” attempts to get your passwords and access codes.

    DO NOT SHARE YOUR PASSWORD. Anyone requiring access to the university system should apply for or be assigned a user account. Please see: https://myuh.hawaii.edu/8888/sessionid=nobody/am-sso-check-status
  8. Do not use your Administrator account as your normal login
    The “Administrator” account is the “master” account that has super-user/administrative rights for total access to your computer. Any user account assigned administrator rights also has total access on the computer. Making an error like deleting a system file or folder can occur if you work as an administrator. Also, if someone captures your password for this login, they now have complete access to your file system. For security purposes, ACU controls the administrative rights to all HCC computers.
  9. Password protect the “Guest” account and disable it
    A standard account that is built-in to the operating system—normally it is disabled by default. But check it and make sure. ACU ensures that the “Guest” account is disabled on all HCC machines.
  10. Set your screensaver with password protection
    Set your screensaver so your password must be re-entered to continue working after it is activated. This ensures that if you are away from your machine for an extended period, that someone cannot use your computer without your password and possibly do wrong through your login.
  11. Periodically clear your browser cache
    The browser cache is a collection of temporary files that originate from the Internet and are stored on your computer to allow your display to “refresh” the presentation on you screen more quickly. However, if you don’t return to view the same websites, these files take up drive space and create clutter against other more recent files. Flushing your browser cache removes all temporary files (including recent stuff), but removes the outdated files clutter and generally improves system performance. In addition, an excess amount of data can cause other applications to not run properly or not run at all. And check the amount of memory that is assigned to the cache. The number grows as additional space is needed by the system. A large number means a large chunk of virtual memory is being reserved and typically means there's a lot of old data being held in the cache. With regular flushing of the cache, a setting of 128MB – 256MB should be adequate.
  12. Defrag your hard drive periodically to improve system performance
    Defrag your hard drive annually to reorganize files on the hard drive for better performance.
  13. Do not download and install applications from the internet indiscriminately
    If you are unsure of the software you want to download, do some research on it first before downloading and installing on your computer; follow recommendations from knowledgeable sources or download/install only applications recognized to be safe. In some instances, utilities or diagnostics touted to help test or secure your PC may in fact decrease security and performance, or damage files on your system.
  14. Remove unused files, documents, applications and drivers including unnecessary programs running in the background
    The additional “clutter” can have an impact on your system and degrade performance.
  15. Disable your e-mail’s preview screen
    This is so emails are not opened until you have a chance to review the source of origin, the message subject line, and title and document type of the attached content. Open emails only from trusted sources.