IT Governance Institute: Computers Are a Hot Holiday Gift -- But Avoid Giving Identity Thieves a Present of Their Own

A little snooping for gifts around the holiday season is normal.
But the many people receiving computers need to be aware of a more
dangerous form of spying that can hit their pocketbook.

To help people enjoy their new computers and protect them from
hackers, spyware, viruses and other threats, the nonprofit,
independent IT Governance Institute (ITGI) offers the following tips:

-- Immediately install a reputable antivirus program and firewall
on the computer.

-- Sign up for automatic updates and maintenance on the security
software; it should check all attachments.

-- Do not open attachments or click on links, even if they look
like the increasingly popular e-cards, from unknown senders.

-- E-mail addresses can be faked, so when in doubt, check with
the sender via telephone.

-- Turn off the computer or disconnect it from the network when
not in use.

-- Regularly back up data.

-- When shopping online, visit only sites that have secure
ordering (e.g., have an "https" address or yellow padlock). Do
not respond to unsolicited links. Only provide information
that is absolutely necessary.

-- When traveling, always keep your PC in sight. Don't conduct
sensitive transactions in unprotected wireless zones--you may
inadvertently provide your bank account and Social Security
numbers and passwords to identity thieves.

"Identity theft, monetary losses, reputational damage and legal
consequences can be severe, so it is important to protect new
computers immediately," said Everett Johnson, CPA, international
president of ITGI. "Not following security precautions can give
hackers another present--your confidential information."

Warning about disposal of old computers

After receiving a new computer, many people put their sensitive
information in jeopardy by neglecting to erase or remove data from old
computers being donated, sold, trashed or recycled. While software is
available to help "wipe" drives, a skilled techie can recover original
data. The safest method is to physically remove the drive from the
computer. It can then either be installed on a new computer or stored
for future use.

"Before disposing of a computer, make absolutely sure all
sensitive information has been removed or deleted," said Johnson.
"Even if the computer is given to a favorite relative, access might
not be restricted to other trusted people."

ITGI (www.itgi.org) was established in 1998 to advance
international thinking and standards in directing and controlling an
enterprise's information technology. ITGI developed Control Objectives
for Information and related Technology (COBIT) and Val IT to assist
enterprise leaders and boards of directors in their IT governance
responsibilities.

WhatsAppFacebookFacebookTwitterTwitterLinkedinLinkedinBeloudBeloudBluesky