A little bit of knowledge goes a long way in making sure your computer resources are secure. We have put together a list of easy-to-use guides that describe best practices for securing your computer resources quickly and effectively. Following security standards reduces maintenance costs and creates a more stable computing environment for everyone.
To secure computer systems, you need administrative access (root, superuser, or administrator) for the systems.
Getting Started
- Learn about safe browsing with our Web Browser Security Guide.
- Secure your Windows-based systems with our Safe Installation and Maintenance Guide for Windows Servers and Workstations.
- Unix and Linux administrators should review our Safe Installation Guide for Unix and Linux.
- See our Web Server Configuration Guide before connecting your web server to the Internet.
- Even simple FTP servers can be exposed to bad data and abuse. Our FTP Server Configuration Guide has advice for Unix FTP servers and Windows IIS Servers.
- Modern printers are complex devices running many services. Learn how to secure your printer from misuse before you connect it to the network.