What are the items on the security checklist?
• Use of strong passwords • Confidential data storage on a portable computer is encrypted • Confidential data transmission is encrypted • Each family member has their own unique login account • Firewall protection from Internet intruders • No P2P software installed • Confidential data cannot be accessed by others who have access to the computer • Anti-malware software running, automatic updates set • Confidential data is not copied to removable media • The guest account is disabled • Operating system patches current, automatic updates set • User knows how to securely erase confidential data when no longer needed • Limited use of the Administrator account • Inactivity timeout not to exceed 30 minutes; login to re-gain access • More may be added as computer threats change •