Copyright Goodheart-Willcox Co., Inc. Section 15.2 Internet Use in the Workplace 371 Figure 15-4. Goodheart-Willcox Publisher Use these tips to create safe, secure passwords. Secure Passwords • Do not be careless or in a hurry. • Do not use passwords that contain easily guessed information. • Do not use the same passwords for multiple accounts or profiles. • Do change your passwords often. • Do record your passwords on a dedicated and secure hard-copy document. Security Settings Become familiar with the security settings and features of your browser when accessing the Internet from your computer. Change your settings to protect your computer and your information. Enabling a pop-up blocker prevents your browser from allowing you to see pop-up ads, which can contain malware. Back Up Your Computer An important part of a security plan is backing up the data on your computer. If a virus invades your computer or the hard disk crashes, it may be too late to retrieve your fi les and computer programs. Your employer will request regular backups of fi les on your work computer. For your personal computer, put a plan in place to perform regular backups. Decide on a storage device and method for backing up your fi les. Place the backup in a fi reproof container and store it at a location other than your home. Checkpoint 15.2 1. Explain why following an acceptable use policy is an example of ethical behavior. 2. Why should a digital citizen be aware of his or her IP address? 3. Discuss the importance of digital security. 4. Explain how to protect a mobile device from theft. 5. Why should a computer be backed up on a regular basis? Build Your Vocabulary As you progress through this course, develop a personal glossary of key terms. This will help you build your vocabulary and prepare you for a career. Write a defi nition for each of the following terms and add it to your personal glossary. acceptable use policy Internet protocol address cookies spyware firewall ✓