Today, more and more people are using their computers for a lot of interests ranging from communication to online banking and investing to shopping. As we do on these things more regularly, we open ourselves up to potential hackers, attackers and crackers. While some may see Phish to your personal information and identity for resale, others simply just want to use your computer as a platform to attack other unknowing targets. Below are some easy, cost-effective steps that you can do to make your computer more secure.
1. Always make a backup and store important information in a safe place separate from your computer.
2. Update and patch your operating system, web browser and software frequently. If you have a Windows operating system, start by opening the www.windowsupdate.microsoft.com and run the update wizard. This program will help you find the latest patches for your Windows computer. Also go to www.officeupdate.microsoft.com possible to find a patch for Office programs.
3. Install a firewall. Without a good firewall, virus, worms, Trojans, malware and adware can all easily access your computer from the Internet. Consideration should be given to the benefits and differences between hardware and software based firewall programs.
4. Review your browser and email settings for optimal security. Why do you have to do this? Active-X and JavaScript are often used by hackers to plant malicious programs on your computer. While cookies are relatively harmless in terms of security, they do still track movement on the Internet to build your profile. Minimal set security setting to "Internet zone" to High, and "trusted sites zone" to Medium Low.
5. Install antivirus software and set to automatic so that you receive the most current version.
6. Do not open unknown email attachments. Is not enough that you might recognize the address from which it originates because many viruses can spread from a familiar address.
7. Do not run programs that come from unknown senders. Also, do not send the type of program to friends and colleagues as a story or Amusing or funny jokes. They may contain Trojans horse waiting to infect your computer.
8. Disable hidden filename extensions. By default, the Windows operating system is set to "hide file extensions for known file types". Disabling this option to display the file extension on Windows. Some file extensions will, by default, continue to remain hidden, but you are more likely to see the file extension that is not always owned.
9. Turn off your computer and disconnect from the network when not using the computer. A hacker can not attack your computer when you are disconnected from the network or the computer is turned off.
10. Consider make a boot disk in the floppy disk if your computer is damaged or compromised by malicious programs. Of course, you need to take this step before you experience a hostile breach of your system.
1. Always make a backup and store important information in a safe place separate from your computer.
2. Update and patch your operating system, web browser and software frequently. If you have a Windows operating system, start by opening the www.windowsupdate.microsoft.com and run the update wizard. This program will help you find the latest patches for your Windows computer. Also go to www.officeupdate.microsoft.com possible to find a patch for Office programs.
3. Install a firewall. Without a good firewall, virus, worms, Trojans, malware and adware can all easily access your computer from the Internet. Consideration should be given to the benefits and differences between hardware and software based firewall programs.
4. Review your browser and email settings for optimal security. Why do you have to do this? Active-X and JavaScript are often used by hackers to plant malicious programs on your computer. While cookies are relatively harmless in terms of security, they do still track movement on the Internet to build your profile. Minimal set security setting to "Internet zone" to High, and "trusted sites zone" to Medium Low.
5. Install antivirus software and set to automatic so that you receive the most current version.
6. Do not open unknown email attachments. Is not enough that you might recognize the address from which it originates because many viruses can spread from a familiar address.
7. Do not run programs that come from unknown senders. Also, do not send the type of program to friends and colleagues as a story or Amusing or funny jokes. They may contain Trojans horse waiting to infect your computer.
8. Disable hidden filename extensions. By default, the Windows operating system is set to "hide file extensions for known file types". Disabling this option to display the file extension on Windows. Some file extensions will, by default, continue to remain hidden, but you are more likely to see the file extension that is not always owned.
9. Turn off your computer and disconnect from the network when not using the computer. A hacker can not attack your computer when you are disconnected from the network or the computer is turned off.
10. Consider make a boot disk in the floppy disk if your computer is damaged or compromised by malicious programs. Of course, you need to take this step before you experience a hostile breach of your system.
Comment
THERE ARE 0 COMMENTS FOR THIS POST
Post a Comment