Computer Usage Best Practices

In addition to the tips below, be aware of TRU's policies on the use of Information Technology, and Information Security, found here.

  1. Backup your data: Regularly backup important files and documents to prevent loss of data in case of hardware failure, accidental deletion, or malware attacks. Utilize OneDrive or your network drive (H:\) for backups.

  2. Restart your computer regularly: It's important to give your computer a fresh start every once in a while. Restarting your computer helps clear temporary files, refresh system processes, and resolve any software glitches or memory leaks that may be affecting performance. Aim to restart your computer at least once a week to keep it running smoothly.

  3. Use strong passwords: Create complex passwords with a combination of uppercase and lowercase letters, numbers, and special characters. Avoid using easily guessable information such as birthdays or common words. Consider using a password manager to securely store and generate passwords.  TRU password standards can be found here.

  4. Regularly update software: Keep your operating system, web browsers, and other software applications updated to benefit from the latest features and security enhancements. Enable automatic updates whenever possible.

  5. Be cautious with email attachments and links: Avoid opening email attachments or clicking on links from unknown or suspicious sources. They may contain malware or phishing attempts. Verify the sender's identity and double-check the email content before interacting with any attachments or links.  Click here for tips on recognizing phishing emails.

  6. Be mindful of downloads: Download files only from trusted sources. Be cautious of downloading files from unverified websites, as they may contain malicious software or viruses. Scan downloaded files with antivirus software before opening or executing them.

  7. Organize and backup emails: Regularly clean up your inbox and archive or delete unnecessary emails. Implement proper email management practices and periodically backup important emails and attachments.

  8. Lock your computer: When you step away from your desk, lock your computer to prevent unauthorized access.  You can quickly lock your Windows computer using Windows+L.  Or CTRL+CMD+Q on a Mac.

Details

Article ID: 6095
Created
Fri 6/16/23 1:13 PM
Modified
Wed 11/29/23 10:10 AM

Related Articles (1)