1 minute read

puter viruses eed more than 2 aspirins

OW SECURE is a home center computer system against hackviruses, vandalism and break- r All software should be purchased from known, reputable sources. o All purchased software should be in its original shrink wrap or sealed diskette containers when received. o Backup copies of all original software should be made as soon as the software package is opened. Backup copies should be stored offsite. a Once purchased, all software should be reviewed carefully by a system manager before it is installed on a distributed system, or computer network. o New software should be quarantined on an isolated computer. This testing will reduce greatly the risk of virus contamination. o A backup copy of all system software and data should be made at least once a month, with the backup copy stored forat least one year before reuse. This will allow restoration of a system that has been contaminated by a "time-released" virus. o System administrators should restrict access to programs and data. This isolates problems, protects critical applications and facilitates the diagnosis of problems. o All programs on a system should be checked regularly for changes in program length. Any size deviations could be evidence of tampering or virus infiltration. r Many "shareware" or "freeware" programs are invaluable. However, these programs are the prime entry point for system viruses. Skepticalreview of such programs is prudent. j Any software that exhibits symptoms of possible virus contamination should be removed from general use immediately. System managers should develop plans for quick removal from service of all copies of a suspect program and immediate backup of all related data.

As virus epidemics, illegal transactions and hacker sabotage make the headlines, home center managers worry about special security practices they should be following. The following recommendations from the National LAN Laboratory in Reston, Va., aim at avoiding infection. Following them will help to prevent and control virus contamination.

Additional security measures recommeded in the industry include careful control of passwords including terminating passwords promptly when an employee leaves the company. Experts suggest avoiding common passwords such as names. Some companies develop two level codes using symbols, numbers and letters on the keyboard to construct a password.

Turning off the modem when data is not being received can prevent access by unauthorized persons. Although it involves manual input, there are companies downloading outside data onto personal computers and rekeying it into the mainframe. Keeping backups of all information in a safe location can prevent loss in a fire or disaster.

Story at a Glance

Ways to keep your computer system healthy. precautions to cut contamination... security practices that work.

This article is from: