Computer Security – 10 Tips For Securing Your Computer System
Computers have evolved from the console based systems of the eighties to present day very user friendly wysiwyg systems that has wowed many and attracted many of us to use them for a variety of transactions. Computers are gaining converts everyday, with many of those using their systems for everything from communications, online banking, and home security and investing to shopping, business and record keeping.
As we do these things on a more regular basis, we open ourselves up to potential dangers lurking on the Internet like hackers, attackers and crackers. While some may be looking to swipe your personal information and identity for resale, others may just want to use your computer as a platform from which to attack other unknowing targets. Below are ten easy and cost-effective steps you can take to protect yourself while ensuring the security of your computer.
1. Number one tip is making backups. You should not under any circumstances avoid making back ups of your system on a regular basis like daily. This will ensure that if your system collapses, you can always restore your data to your last known settings.
2. Update and patch your operating system, web browser and software installations frequently. If you have a Windows operating system, start by going to www.windowsupdate.microsoft.com and running the update wizard. This program will help you find the latest patches for your Windows computer. Also go to www.officeupdate.microsoft.com to locate possible patches for your Office programs.
3. Install a firewall. Without a good firewall, viruses, worms, Trojans, malware and adware can all easily access your computer from the Internet. Consideration should be given to the benefits and differences between hardware and software based firewall programs.
4. Review your browser and email settings for optimum security. Why should you do this? Active-X and JavaScript are often used by hackers to plant malicious programs onto your computers. While cookies are relatively harmless in terms of security concerns, they do still track your movements on the Internet while building a profile on you. At a minimum ensure your security settings for the “internet zone” are set to High, and your “trusted sites zone” to Medium Low.
5. Install antivirus software and set for automatic updates so that you receive the most current versions.
6. Do not open unknown email attachments. It is simply not enough that you may recognize the address from which it originates because many viruses can spread from a familiar address.
7. Do not run programs from unknown origins. Also, do not send these types of programs to friends and coworkers because they contain funny or amusing stories or jokes. They may contain a Trojan horse waiting to infect a computer.
8. Disable hidden filename extensions. By default, the Windows operating system is set to “hide file extensions for known file types”. Disable this option so that file extensions display in Windows. Some file extensions will, by default, continue to remain hidden, but you are more likely to see any unusual file extensions that do not belong.
9. Turn off your computer and disconnect from the network when not using the computer. A hacker can not attack your computer when you are disconnected from the network or the computer is off.
10. Consider making a boot disk on a USB disk in case your computer is damaged or compromised by a malicious program. Obviously, you need to take this step before you experience a hostile breach of your system.
As we do these things on a more regular basis, we open ourselves up to potential dangers lurking on the Internet like hackers, attackers and crackers. While some may be looking to swipe your personal information and identity for resale, others may just want to use your computer as a platform from which to attack other unknowing targets. Below are ten easy and cost-effective steps you can take to protect yourself while ensuring the security of your computer.
1. Number one tip is making backups. You should not under any circumstances avoid making back ups of your system on a regular basis like daily. This will ensure that if your system collapses, you can always restore your data to your last known settings.
2. Update and patch your operating system, web browser and software installations frequently. If you have a Windows operating system, start by going to www.windowsupdate.microsoft.com and running the update wizard. This program will help you find the latest patches for your Windows computer. Also go to www.officeupdate.microsoft.com to locate possible patches for your Office programs.
3. Install a firewall. Without a good firewall, viruses, worms, Trojans, malware and adware can all easily access your computer from the Internet. Consideration should be given to the benefits and differences between hardware and software based firewall programs.
4. Review your browser and email settings for optimum security. Why should you do this? Active-X and JavaScript are often used by hackers to plant malicious programs onto your computers. While cookies are relatively harmless in terms of security concerns, they do still track your movements on the Internet while building a profile on you. At a minimum ensure your security settings for the “internet zone” are set to High, and your “trusted sites zone” to Medium Low.
5. Install antivirus software and set for automatic updates so that you receive the most current versions.
6. Do not open unknown email attachments. It is simply not enough that you may recognize the address from which it originates because many viruses can spread from a familiar address.
7. Do not run programs from unknown origins. Also, do not send these types of programs to friends and coworkers because they contain funny or amusing stories or jokes. They may contain a Trojan horse waiting to infect a computer.
8. Disable hidden filename extensions. By default, the Windows operating system is set to “hide file extensions for known file types”. Disable this option so that file extensions display in Windows. Some file extensions will, by default, continue to remain hidden, but you are more likely to see any unusual file extensions that do not belong.
9. Turn off your computer and disconnect from the network when not using the computer. A hacker can not attack your computer when you are disconnected from the network or the computer is off.
10. Consider making a boot disk on a USB disk in case your computer is damaged or compromised by a malicious program. Obviously, you need to take this step before you experience a hostile breach of your system.