10 Most Dangerous Things You Can Do Online

  1. Opening attachments from unknown senders is the riskiest thing you can do. Research shows that email attachments remain the number one means by which worms and viruses propagate.
  2. Installing unauthorized applications such as file-sharing tools (Limewire, Azureus and other Bit Torrent clients) - Illegal downloads are against CTS policy and they, like email attachments, are simply another means by which "bad" files get on your computer.
  3. Number three is disabling security tools. While trouble-shooting slow applications, many users will attempt to turn off security tools. The problem is not only does this make your system vulnerable to compromise, many users forget to turn them back on!
  4. While most people may know not to open email attachments, many don't realize that dangers can lie in the body of an email too. HTML mail or mails that contain embedded photos are just as dangerous. Embedded images and PDFs can contain malicious code that is harmful. So be sure not to open any unsolicited/suspicious mail.
  5. Surfing questionable sites is always dangerous. You will find, more times than not, that porn, gambling and sites that host illegal content are the same sites that install malicious software on your computer.
  6. Giving/lending passwords - Don't share your password with others, including fellow colleagues or even the Service Desk. Keep your user name and password to yourself. Exposing it means you're exposing salary, banking, class registration information, etc.!
  7. Browsers are quickly becoming some of the larger vulnerabilities in computing. Adware and spyware are written specifically to exploit Internet Explorer and Firefox. So avoid surfing sites that you don't already know and stick with the ones you trust.
  8. Public wireless networks are a huge risk because they are shared. The guy sitting across from you could be a hacker, stealing your password. Make sure you leave the firewall turned on and avoid sending passwords through the air. Only use encrypted wireless networks as they offer higher levels of protection.
  9. Public computers - There may be nobody behind you watching you as you type. But that doesn't stop a keylogger (a program or device that logs all your key-strokes) from collecting your information. Try to keep all sensitive material on your own machine (the one that you maintain and protect), and keep it off those public computers.
  10. Avoid social networking sites. Sites like MySpace and Facebook are a dream for thieves and stalkers. They allow anyone the ability to gather information about you that may aid them in stealing your identity. Think twice before you post any sensitive or damaging information on these sites.

Security tips are brought to you by the CTS SOC. The mission of the CTS SOC is to provide centralized information sharing, monitoring, and analysis of Washington State security posture. Contact us at: soc@cts.wa.gov.