Skip to main content

Secondary navigation:

Information Technology Services

Protect Your Identity, Credit Card Information, and Computer

security credentials

Learn how to protect your identity, credit card information, and computer.

For a quick introduction to protecting your personal identity, check out this presentation (PDF) (BC sign-in required).

  1. Are your identity and credit card information safe?
  2. Are your online activities being watched?
  3. Is your computer safe from viruses?
  4. Are your documents and files easily accessible to others?

Are your identity and credit card information safe?

Phishing is when you receive an email that appears to be from a well-known company, but is actually attempting to steal your credit card numbers and other personal information!


Are your online activities being watched?

Spyware is a type of malware that is installed on computers and collects little bits of information at a time about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically, spyware is secretly installed on the user's personal computer. Sometimes, however, spywares such as keyloggers are installed by the owner of a shared, corporate, or public computer on purpose in order to secretly monitor other users.

Read the full definition from Wikipedia.

 

How do I remove malware and spyware from my Windows computer?

Learn how to install and use Windows software that can detect and remove malware, including spyware and adware, from your computer:

Note: It is recommended that you clean your computer after removing malware by using one of the following programs:

 

Is your computer safe from viruses?

An unprotected computer can become infected within 15 minutes of being on the Internet. Do not let your computer be a target!

 

Are your documents and files easily accessible to others?

Use of unsecured wireless networks can put you at risk.

Wireless networks broadcast and retrieve data through the air using radio frequencies, similar to those used by cordless phones. Data, such as credit card numbers, passwords, email or instant messages, transmitted “in the clear” over an unencrypted wireless service can be intercepted and viewed by a malicious user without your knowledge. Data that is submitted via an unsecure Web site or application is even more vulnerable. We recommend that you use the BC secure wireless network (BC sign-in required).

When you are connected to file-sharing programs for music, games, or software, you may unknowingly allow others to copy private files you never intended to share.

 

Want to learn more?

Learn about stopping unwanted email and spam, protecting your computer from hackers and viruses, keeping your personal info private, and keeping children safe online from www.GetNetWise.org.

Learn more about fraudulent (phishing) emails, including how to spot them:

Learn about the risks of being online and how you can protect your computer:

Learn more about identity theft:

 

Security Study

AOL/NCSA Online Safety StudyRead the results (PDF) of one of the largest & most comprehensive in-home studies ever conducted on the security of computer users.