IT Governance Institute: Computers Are a Hot Holiday Gift -- But Avoid Giving Identity Thieves a Present of Their Own



    A little snooping for gifts around the holiday season is normal.
    But the many people receiving computers need to be aware of a more
    dangerous form of spying that can hit their pocketbook.

    To help people enjoy their new computers and protect them from
    hackers, spyware, viruses and other threats, the nonprofit,
    independent IT Governance Institute (ITGI) offers the following tips:

    -- Immediately install a reputable antivirus program and firewall
    on the computer.

    -- Sign up for automatic updates and maintenance on the security
    software; it should check all attachments.

    -- Do not open attachments or click on links, even if they look
    like the increasingly popular e-cards, from unknown senders.

    -- E-mail addresses can be faked, so when in doubt, check with
    the sender via telephone.

    -- Turn off the computer or disconnect it from the network when
    not in use.

    -- Regularly back up data.

    -- When shopping online, visit only sites that have secure
    ordering (e.g., have an "https" address or yellow padlock). Do
    not respond to unsolicited links. Only provide information
    that is absolutely necessary.

    -- When traveling, always keep your PC in sight. Don't conduct
    sensitive transactions in unprotected wireless zones--you may
    inadvertently provide your bank account and Social Security
    numbers and passwords to identity thieves.

    "Identity theft, monetary losses, reputational damage and legal
    consequences can be severe, so it is important to protect new
    computers immediately," said Everett Johnson, CPA, international
    president of ITGI. "Not following security precautions can give
    hackers another present--your confidential information."

    Warning about disposal of old computers

    After receiving a new computer, many people put their sensitive
    information in jeopardy by neglecting to erase or remove data from old
    computers being donated, sold, trashed or recycled. While software is
    available to help "wipe" drives, a skilled techie can recover original
    data. The safest method is to physically remove the drive from the
    computer. It can then either be installed on a new computer or stored
    for future use.

    "Before disposing of a computer, make absolutely sure all
    sensitive information has been removed or deleted," said Johnson.
    "Even if the computer is given to a favorite relative, access might
    not be restricted to other trusted people."

    ITGI (www.itgi.org) was established in 1998 to advance
    international thinking and standards in directing and controlling an
    enterprise's information technology. ITGI developed Control Objectives
    for Information and related Technology (COBIT) and Val IT to assist
    enterprise leaders and boards of directors in their IT governance
    responsibilities.