Computer Security Checklist

4.8/5 with 136 votes
0/41
Toggle Data Backup status

Data Backup

Toggle Perform regular backups of all data files. status

Perform regular backups of all data files.

Toggle Test restoration of client data files to ensure the backup files work. status

Test restoration of client data files to ensure the backup files work.

Toggle Make sure at least one copy of the data is stored in a secure, off-site location. status

Make sure at least one copy of the data is stored in a secure, off-site location.

Toggle Review your backup requirements periodically. status

Review your backup requirements periodically.

Toggle Physical Security status

Physical Security

Toggle Make sure your computers are located in areas that are not easily accessible to outsiders. status

Make sure your computers are located in areas that are not easily accessible to outsiders.

Toggle Make sure you and your staff take responsibility for locking doors and windows. status

Make sure you and your staff take responsibility for locking doors and windows.

Toggle Check if your desktop and laptop computers are equipped with anti-theft devices. status

Check if your desktop and laptop computers are equipped with anti-theft devices.

Toggle Check if your network servers are physically secure in a separate area. status

Check if your network servers are physically secure in a separate area.

Toggle Make sure you have an accurate inventory of all computing equipment and software that is stored off-site. status

Make sure you have an accurate inventory of all computing equipment and software that is stored off-site.

Toggle Implement a "clear desk" policy to ensure your staff secures sensitive and confidential files when they're not working on them. status

Implement a "clear desk" policy to ensure your staff secures sensitive and confidential files when they're not working on them.

Toggle Virus Protection status

Virus Protection

Toggle Check if anti-virus software is installed on all your computers. status

Check if anti-virus software is installed on all your computers.

Toggle Check if anti-virus software been configured to check all mediums (email, web sites, downloaded files) for viruses. status

Check if anti-virus software been configured to check all mediums (email, web sites, downloaded files) for viruses.

Toggle Check if a procedure for automatically updating the anti-virus software is in place. status

Check if a procedure for automatically updating the anti-virus software is in place.

Toggle Check if users know what to do when infected with a computer virus. status

Check if users know what to do when infected with a computer virus.

Toggle Make sure you and your staff open only attachments they expect. status

Make sure you and your staff open only attachments they expect.

Toggle Disaster Recovery status

Disaster Recovery

Toggle Have written continuity plan in place in the case of a major disaster (like fire). status

Have written continuity plan in place in the case of a major disaster (like fire).

Toggle Check how long your practice could function without computers, servers, or network access. status

Check how long your practice could function without computers, servers, or network access.

Toggle Check if your head office provide any disaster recovery assistance. status

Check if your head office provide any disaster recovery assistance.

Toggle Make sure you have at least one copy of client data and application software stored in a secure, off-site location. status

Make sure you have at least one copy of client data and application software stored in a secure, off-site location.

Toggle Make sure you have a current inventory of your computer equipment, software, and critical client files. status

Make sure you have a current inventory of your computer equipment, software, and critical client files.

Toggle Firewall status

Firewall

Toggle Check if all of your computers have firewall software installed. status

Check if all of your computers have firewall software installed.

Toggle Make sure the firewall software been configured to protect the required information on your computers. status

Make sure the firewall software been configured to protect the required information on your computers.

Toggle Check if your network have a hardware firewall installed. status

Check if your network have a hardware firewall installed.

Toggle Check if you have firewalls installed at every point where your computer systems is connected to other networks. status

Check if you have firewalls installed at every point where your computer systems is connected to other networks.

Toggle Password Management status

Password Management

Toggle Require passwords for access to all computers. status

Require passwords for access to all computers.

Toggle Choose "strong" passwords. status

Choose "strong" passwords.

Toggle Change passwords regularly. status

Change passwords regularly.

Toggle Make sure that passwords are not written down or shared. status

Make sure that passwords are not written down or shared.

Toggle Prevent users from choosing passwords that have been used only a short while ago. status

Prevent users from choosing passwords that have been used only a short while ago.

Toggle Deactivate accounts for terminated employees in a timely manner. status

Deactivate accounts for terminated employees in a timely manner.

Toggle Miscellaneous status

Miscellaneous

Toggle Don't store sensitive information on USB drives status

Don't store sensitive information on USB drives

Toggle Frequently clear private data from Web browsers. status

Frequently clear private data from Web browsers.

Toggle Make sure your operating system is updated. status

Make sure your operating system is updated.

Toggle Use a password-protected screen saver or 'lock' the screen. status

Use a password-protected screen saver or 'lock' the screen.

Download or Print this Computer Security Checklist

Get a printable version of this checklist in your preferred format: PDF, Word, Excel, or print directly from your browser.

Presented by:

Alex Strickland

Alex Strickland

Stats

Views

226

Uses

17

Tasks

41

Introduction

Our Computer Security Checklist provides a detailed framework to help you protect your digital assets effectively. From data backup strategies to virus protection measures, this checklist covers all critical areas of cybersecurity to ensure your systems remain secure against threats. By utilizing our Checklist App, you can easily save and customize the template to fit your specific needs. With features like syncing across devices and collaboration with your team, staying on top of your computer security has never been easier. Begin enhancing your security protocols today!

Who it's for

This Computer Security Checklist is for teams that want consistent execution, less rework, and clear ownership.

  • Standardize quality - run the same Computer Security steps every time, regardless of who executes
  • Save time - reuse a proven Computer Security workflow instead of rebuilding processes from scratch
  • Improve accountability - assign owners and see what's done vs. what's pending
  • Onboard faster - use the Computer Security checklist as the SOP and training guide
  • Coordinate across roles - handoffs are clear and everyone works from the same source of truth

How to use it

How to use this Computer Security Checklist:

  1. Start by saving it - save as a Template if you'll reuse it, or as a Checklist if it's a one-off project.
  2. Customize it once for your workflow - remove what doesn't apply and add your team-specific steps.
  3. Assign ownership and execute - set owners/due dates where needed and track completion as work happens.
  4. Reuse without rebuilding - when Computer Security comes up again, start from your saved version and run it with clear ownership.

Suggest Improvements

Rate this Checklist

5 stars
Scores 4.80 with 136 votes

Not finding exactly what you need?

Generate a custom checklist with AI in seconds.

Works on Web, iOS, and Android. No credit card required.