If you have not followed some of these tips before, this information can function as a security checklist. Patch, Patch, PATCH! Set up your computer for automatic software and operating system updates. An unpatched machine is more likely to have software vulnerabilities that can be exploited. Install protective software. There are some download for Windows, Macintosh, and Linux from SJTU net (http://antivirus.sjtu.edu.cn/) software page. When installed, the software should be set to scan your files and update your virus definitions on a regular basis. Choose strong passwords. Choose strong passwordswith letters, numbers, and special characters to create a mental image or an acronym that is easy for you to remember. Create a different password for each important account, and change passwords regularly. Backup, Backup, BACKUP! Backing up your machine regularly can protect you from the unexpected. Keep a few months' worth of backups and make sure the files can be retrieved if needed.Learn more about OneDrive for business and how to backup your system. Use email and the Internet safely. Ignore unsolicited emails, and be wary of attachments, links and forms in emails that come from people you don't know, or which seem "phishy." Avoid untrustworthy (often free) downloads from freeware or shareware sites. Use desktop firewalls. Macintosh and Windows computers have basic desktop firewalls as part of their operating systems. When set up properly, these firewalls protect your computer files from being scanned. Protecting a computer vs. safe computing behavior You can see from the list above that safe computing practices include a combination of how you physically or technically protect your computer by using software and security settings, and the actions you take. You need both to really make a difference. If you consistently use strong passwords, but then leave your computer unlocked and unattended in public places, you are still putting your data in jeopardy. If you use anti-virus software but aren't careful about replying to or forwarding suspicious looking emails, you still risk spreading a virus.