Software for Cyber Hygiene © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering
Evaluate Security Settings Avoid Java, Flash, ActiveX Update to current versions of browser, plug-ins, operating system Beware: Vulnerable Software
Antivirus programs search for signatures of known malware. Signatures are bit sequences known to be part of the malware such as text or executable code Scan regularly Update definitions regularly Use Antivirus Programs
A firewall screens packets based on source and destination addresses and ports White list ports you are using Deny other traffic Can be software running on a gateway computer or router or software running on your computer Use a Firewall
On mobile devices, use cellular data instead of public WiFi for , banking, etc. Disconnect from the Internet when not in use Public WiFi
Download software directly from source Check reviews Hesitate and read aloud for user access control windows Downloading Software
Can transmit malware across systems –Use to cross systems rather than USB –Do not open an unknown USB drive Public USB ports can steal data; electrical outlets with your own USB charger are more secure Use passwords for sensitive data Label externally with your name USB drives