|Title||Start Date & Time||End Date & Time|
|Service Maintenance Completed: Virtualized desktop and BYOD deployments||Monday, November 23, 2015 - 9:00am||Friday, November 27, 2015 - 5:00pm|
|Service Maintenance Scheduled: RedHat Enterprise Linux systems||Wednesday, December 2, 2015 - 7:00am||Wednesday, December 2, 2015 - 7:30am|
|Service Maintenance Scheduled: HR Resources||Friday, November 20, 2015 - 5:00pm||Thursday, December 3, 2015 - 9:00am|
Hardening your computer is an essential step for securing your personal information and data. However, many people do not know what simple steps can be taken to safeguard their systems.
Hardening a computer involves several steps to form "layers" of protection. Using antivirus and antispyware protection, regularly downloading the latest manufacturers patches, and disabling unneeded software and applications leads to safer, more secure computers which are harder to break into.
Hardening your computer is an important step in the fight to protect your personal data and information. This process works to eliminate means of attack by patching vulnerabilities and turning off inessential services. Hardening a computer involves several steps to form layers of protection. This approach to safer computing is often called “defense in depth”.
Applying vendor security patches regularly is the first step to help harden your computing system. Also, many security experts recommend installing a firewall on your computer. Additional hardening actions include closing server ports, disabling Windows and other programs file-sharing, and additionally hardening email programs. Tips for hardening computers are listed below, along with several other helpful links on hardening.
Another layer of protection for your computer is to install and regularly use virus and spyware protection software. Scheduling daily automatic definition updates and scans to be performed on your computer are vital steps. Antivirus software is available to all CU-Boulder faculty, staff, and students free or charge. Free anti-spyware software is available from Microsoft and Safer-networking.
Good computer security is about finding the right balance between hardening your system against potential threats and maintaining usability. If you do not require a particular software application or service it should be disabled and removed. Extra software just requires more work on your part to make it harder to a computer attack to be successful. Adding unnecessary software can lead to your PC spreading a virus or providing a launching pad for attacks against other campus systems.