May 31, 2018

Top Ten System and Data Security Tips


1. Patch, Patch, PATCH!

An unpatched machine is more likely to have software vulnerabilities that can be exploited.


2. Install protective software. Schedule a regular scan and update your virus definitions automatically.


3. Choose strong passwords.

Strong passwords use a combination of letters, numbers, and special characters. Create a unique password for each account.


4. Back up on a regular basis.

Scheduling routine backups can protect you from the unexpected. Always keep a few months' worth of retrievable backup.


5. Control access to your machine.

Don't leave your computer in an unsecured, public area, especially if you're logged on. The physical security of your machine is just as important as its technical security.


6. Use email and the internet safely.

Ignore unsolicited emails. Be wary of attachments, links, and forms in emails that come from people you don't know, or which seem "phishy." Avoid untrustworthy (often free) downloads.


7. Use secure connections.

When connected to the internet, your data can be vulnerable while in transit. Use remote connectivity and secure file transfer options when off campus.


8. Protect sensitive data.

Securely remove sensitive data files from your hard drive, especially when recycling or repurposing your computer. Protect sensitive files using the encryption tools built into your operating system.


9. Use desktop firewalls.

Mac and Windows computers use basic desktop firewalls to protect your computer files from being scanned. Make sure they are properly configured.


10. Most importantly, stay informed.

Stay current with the latest developments.

New Posts
  • support
    Jun 20, 2018

    Known Issues - June 2018 Windows 10 version 1607 1. Addresses an issue that causes BitLocker to go into recovery mode when updates are applied. 2. Addresses an issue that might sometimes lead to incorrect checks for applicability during installation of Windows Updates. Windows 10 version 1607 and Windows Server 2016 need KB4132216 ( ) prior to installing the June 2018 update. Recommendation is we can proceed with pilot patching. For Windows 2016 servers, make sure to install KB4132216 before patching June 2018 updates. For Windows 10 version 1607 clients, we need to deploy KB4132216 first. KB4132216 does not require a reboot after install. So we can push it out to the client without user notice.  Refer to:
  • support
    Oct 23

    A vulnerability has been discovered in Google Chrome versions prior to 67.0.3396.62, which could result in arbitrary code execution. This can allow the retrieval of information, security bypasses, and denial-of-service vulnerability. There are currently no reports of these vulnerabilities being exploited in the wild.
  • support
    Nov 13


© NZ ServiceDesk Plus 2018 All rights reserved 

T: 09 963 6052   E:

  • Facebook Clean
  • Twitter Clean
  • White Google+ Icon