Computer Security Checklist
Table of Contents
Data Backup
Perform regular backups of all data files.
Test restoration of client data files to ensure the backup files work.
Make sure at least one copy of the data is stored in a secure, off-site location.
Review your backup requirements periodically.
Physical Security
Make sure your computers are located in areas that are not easily accessible to outsiders.
Make sure you and your staff take responsibility for locking doors and windows.
Check if your desktop and laptop computers are equipped with anti-theft devices.
Check if your network servers are physically secure in a separate area.
Make sure you have an accurate inventory of all computing equipment and software that is stored off-site.
Implement a "clear desk" policy to ensure your staff secures sensitive and confidential files when they're not working on them.
Virus Protection
Check if anti-virus software is installed on all your computers.
Check if anti-virus software been configured to check all mediums (email, web sites, downloaded files) for viruses.
Check if a procedure for automatically updating the anti-virus software is in place.
Check if users know what to do when infected with a computer virus.
Make sure you and your staff open only attachments they expect.
Disaster Recovery
Have written continuity plan in place in the case of a major disaster (like fire).
Check how long your practice could function without computers, servers, or network access.
Check if your head office provide any disaster recovery assistance.
Make sure you have at least one copy of client data and application software stored in a secure, off-site location.
Make sure you have a current inventory of your computer equipment, software, and critical client files.
Firewall
Check if all of your computers have firewall software installed.
Make sure the firewall software been configured to protect the required information on your computers.
Check if your network have a hardware firewall installed.
Check if you have firewalls installed at every point where your computer systems is connected to other networks.
Password Management
Require passwords for access to all computers.
Choose "strong" passwords.
Change passwords regularly.
Make sure that passwords are not written down or shared.
Prevent users from choosing passwords that have been used only a short while ago.
Deactivate accounts for terminated employees in a timely manner.
Miscellaneous
Don't store sensitive information on USB drives
Frequently clear private data from Web browsers.
Make sure your operating system is updated.
Use a password-protected screen saver or 'lock' the screen.
Download or Print this Computer Security Checklist
Get a printable version of this checklist in your preferred format: PDF, Word, Excel, or print directly from your browser.
Presented by:
Alex Strickland

Stats
Views
226
Views: 226
Uses
17
Uses: 17
Tasks
41
Tasks: 41
Introduction
Who it's for
This Computer Security Checklist is for teams that want consistent execution, less rework, and clear ownership.
- Standardize quality - run the same Computer Security steps every time, regardless of who executes
- Save time - reuse a proven Computer Security workflow instead of rebuilding processes from scratch
- Improve accountability - assign owners and see what's done vs. what's pending
- Onboard faster - use the Computer Security checklist as the SOP and training guide
- Coordinate across roles - handoffs are clear and everyone works from the same source of truth
How to use it
How to use this Computer Security Checklist:
- Start by saving it - save as a Template if you'll reuse it, or as a Checklist if it's a one-off project.
- Customize it once for your workflow - remove what doesn't apply and add your team-specific steps.
- Assign ownership and execute - set owners/due dates where needed and track completion as work happens.
- Reuse without rebuilding - when Computer Security comes up again, start from your saved version and run it with clear ownership.