Penn Computing

Penn Computing

Computing Menu Computing A-Z
Computing Home Information Systems & Computing Penn


Tuesday, May 31, 2016

  New Resources
Security Logging Service
Travel Tips for Data Security
Free Security/Privacy Training Resources
Two-step verification
Combating Malware
Phishing Archive
Cloud Computing and Data Outsourcing
Best Practices for Applications with Confidential University Data
  Security "Greatest Hits"
Managing Passwords
E-mail Harassment & Forgery
Hoaxes, frauds & scams
Wireless Networking
  Best Practices
Secure desktop computing
Secure servers
Secure data deletion
Securing printers
Tips for safe computing
Computing policies
  More in-depth information for
Local support providers
System administrators
  Security initiatives
Critical Component compliance
Authentication & authorization
Penn Security & Privacy Assessment (SPIA)
Security Liaisons (Restricted Access)
Secure Share
Secure Space
Vulnerability Scanner
  Related links
Electronic privacy
Worms, trojans, backdoors

One Step Ahead: Almanac Security Tips - 2016

In each issue, Penn's Journal of Record, The Almanac publishes helpful tips and hints for dealing with information security and privacy matters. This page is a collection of all those published thus far.
New! You can now receive new One-Step-Ahead Security and Privacy Tips automatically!
You can subscribe via Email or RSS.

Table of Contents (view all)

Most recently published...

Protect your Home Computers by Turning On Automatic Updates
Personal vs University Accounts
Reuniting with your Missing Mobile Device
LastPass Premium:† Penn-Provided Software to Help Manage Your Passwords Securely
Filing Taxes Online This Year? Take Steps to Protect Your Information!
February is Data Privacy Month
Mobile Devices and Public Wi-Fi - Stick to Window Shopping
TMI: The Risks of Sharing Too Much Information on Social Media
Make Sure Your Email Gets Into Their Inbox
Avoiding Phishing Attacks
Be Wary of Fake Tech Support Telephone Call Scams!
Tips for Handling Electronic Access in Employee Termination
National Cyber Security Awareness Month - Free Secure Disposal of Paper
Begin the "Year of Discovery" By Knowing the Rules for Protecting Student Record Informati
Welcome Back! Here's a Map to Good Information Security

Whats popular?

   privacy    security    identity theft    passwords    software    www    email    home computing    phishing    virus    hackers    documents        SSNs    mobile devices    keyloggers    wireless    social networking

Tuesday, May 3, 2016 - Almanac Vol. 62, No. 33

One Step Ahead: Protect your Home Computers by Turning On Automatic Updates

Your Penn computer is likely centrally managed by your organizationís IT department. One of the benefits of this configuration is that it enables the IT department to install the latest or most critical software updates when they are released. The timely installation of updates is vitally important to protect the privacy and security of both your personal data and Pennís data.

Unfortunately, many home computers are not nearly as well maintained. Far too often, peopleís home computers are weeks, months or even years behind in vital updates. This leaves them increasingly vulnerable to hackers, spyware and other forms of malicious attacks. Security updates in particular need to be installed soon after vulnerabilities are announced. Attackers look to exploit publicly announced security holes because they know that people generally are slow to install updates.

A great way to ensure your home computer stays updated and secure is to turn on the Automatic Update feature in operating systems, applications like Firefox and browser plugins like Adobe Reader and Adobe Flash. You will be relieved of the burden of having to remember to manually install updates, and critical updates will be installed in time. The benefits of keeping your computer secure by automatically installing updates far outweigh any concerns.

Each operating system and application has a method of turning on automatic updates. Check the Help, About or Information menu for each operating system and application for additional instructions.


Information Systems and Computing
University of Pennsylvania
Comments & Questions

Penn Computing University of Pennsylvania
Information Systems and Computing, University of Pennsylvania