Skip Navigation
Michigan Cyber InitiativeMichigan.gov, Official Website for the State of Michigan
Michigan.gov Home Cybersecurity Home Contact Us
close print view

Best practices

1. Use anti-virus software: 

Your anti-virus software should be set to constantly monitor your system using "real-time monitoring," and you should be sure your virus definitions are kept up to date.

2. Install hardware and software firewalls: 

Your network should be behind a hardware firewall, particularly with a high-speed connection. Install a personal firewall to block any content that the hardware may miss.

3. Create strong passwords: 

A strong password is one that has at least 8 characters including letters, numbers, and other non-alphanumeric characters.

4. Establish a back-up schedule for important data: 

Creating and maintaining a set schedule for backing up your data can prepare you for any unfortunate breach that could occur despite your best efforts to remain secure.

5. Maintain up-to-date security patches:

Carefully review and install software patches as soon as they become available. This will help to reduce the amount of time that you are vulnerable to an attack.

6. Use password-protected screen savers:

Reduce the chance that others are able to access your data by using a screen saver that activates after a short time and requires a password to return to the desktop.

7. Check the settings in your e-mail client and web browser: 

In your e-mail client you should use content filter settings to block unwanted e-mail. You can also set your Web browser to block cookies and unwanted JavaScript.

8. Use safe e-mail and download practices: 

Most computer viruses spread through e-mail or direct downloading to your computer. With this in mind, you should think carefully about everything that you download.

9. Increase your awareness of internet security: 

Become aware of the dangers surrounding you on the Internet. You can do this through formal training, or simply keeping up with the latest Internet news and alerts.

10. Establish policies and rules for information security: 

Policies or rules should be established in your business or agency, and even in your home, providing guidelines for secure computer use.

QR code

Michigan.gov Home Cybersecurity Home Liability Limitation
Accessibility PolicyLink PolicySecurity PolicyPrivacy PolicyMichigan NewsMichigan.gov Survey


Copyright © 2001-2013 State of Michigan