Skip to main content

Secure Computing

You play an important role in protecting both your personal and business data and financial information. Let’s work together to implement security measures designed to protect your computer assets and information.

 

Understand the Threat

The simple truth is that hackers, cybercriminals and identity thieves try to compromise personal and business computers to obtain sensitive information—every day. They use malware (short for “malicious software”) and other tactics to gather information about you or your computing behaviors.

Malware includes viruses, spyware, and trojans that are designed to infiltrate or steal personal information and commit fraud. The criminals often seek out company secrets, computing resources, personally identifiable information on employees or customers, and financial account/card information.

Proactively engaging in secure computing practices helps protect your computer and your Viewpost® account from cyber threats. It’s important for you to protect your username, password, account information, and other sensitive data.

 

Protect Yourself Against Cyber Threats

It’s in your best interest to protect your username, password, Viewpost account information, and other personal data. The best way to better guard your information is to become more aware of the cyber threats, implement security controls, and continually improve these controls as threats change. While the tactics and attacks of the cybercriminal vary and are constantly evolving, we have some prudent measures that can help you better secure your information.

  • Anti-Virus Software
    Installing and updating anti-virus and anti-spyware software helps to keep your computer free of unwanted visitors. Make sure your anti-virus is set to routinely clean your computer from viruses/spyware.
  • Password Protection
    Create and use a secure password to help protect your devices from unauthorized entry.
  • Email Phishing
    Use caution when opening email attachments from individuals you do not know—simply delete them because they could be an attempt at email phishing. NEVER provide your personal information, password, or account information in response to an email you receive.
  • Downloads and Applications
    When downloading software and mobile applications, only install those from well-known companies you trust and can verify.
  • Wireless Networks
    Choose an encrypted wireless network for maximum security. Open networks are less secure giving more opportunity for cyber attacks.
  • Your Mobile Device
    While your mobile device is not your computer, it provides access to your financial accounts and personal information. Protect your mobile device from unauthorized access through password protection, automatic screen locking, software updates, and downloading trusted apps from a reputable store.
  • The Unexpected
    Always log out of websites or applications so your information cannot be compromised if the device is lost or stolen. Make it your business to protect your business from potential risks. Secure computing doesn’t guarantee against cyber attacks, but it makes you less vulnerable to phishing, hacking and fraud by cybercriminals.

 

Quick Tip
Enable an automatic screen-lock setting on your electronic devices to prevent unauthorized access if lost or stolen.

 

Helpful Resources

Access more information on secure computing best practices and additional security measures at the following resources:

 

Stay sharp.

Keep learning more about security best practices.