5 Steps To PC Security
The purpose of this article is to advise you on what you need to do to secure your computer in 5 relatively simple steps.
Step 1 - Buy an Internet Security Suite: If you're unsure what an Internet Security Suite is, very briefly, it's usually a combination of a firewall and antivirus software. These products can be bought and installed on your computer separately but I always advise people to get a combined product as it's less complicated. An Internet Security Suite may even include other useful features like ad blocking, anti-spam, or even file backup and PC tune up facilities.
Step 2 - Password protect your user accounts: If you share your computer with one or more other people, it would be a very good idea to have your own password protected user account. When you share a computer, its security is no longer your sole responsibility; it's the responsibility of everyone who uses it. In such an environment, password protecting you own account will not prevent the other users from downloading malware but depending on the circumstances, it may at least prevent the loss of your own data.
If you're the owner of a shared computer it would be a very good idea to restrict the access of the other users. This means giving them limited accounts so that they can use the computer without being able to make changes to the system that will damage the computer or affect other users. Administrative accounts should only be given to those who really need it for a good reason.
Step 3 - Beware of suspicious emails: By far, the best way to deal with scam emails is by using common sense. However, here are some things to remember.
Do's and Don'ts
Step 4 - Use a pop-up blocker: Most browsers come with a facility to prevent these pop-ups from...well, "popping up." Check the help files for your particular browser to see if it has this facility and if it does, switch it on! Also, beware of messages that appear on websites offering you free antivirus software, free registry scans, etc. These messages are often designed to look like genuine messages from your own computer but they are most definitely not! Clicking on them will almost certainly infect your computer with malware.
Step 5 - Secure Your Wireless Network: It may interest you to know that armed with tools freely available on the internet, a hacker (not even a very good hacker) can access an unsecure wireless network with relative ease. Once access is gained he/she can potentially read the files on your computer, view the pages you've browsed on the internet, and even use your internet connection for a whole host of criminal activities. For instance, they could use your internet connection to send bulk emails, hack into other computers, download indecent images of children, and many more.
Secure your wireless network by placing password protection on it. Only computers with the password will be able to connect to the network.
If you follow these steps you'll be well along the way to securing your PC and your online world.
I hope you enjoyed reading this article and found it helpful and informative. However, the article has been cut down for this site. To read the full version, please visit the News & Articles section of the Quantum Concepts website.
Thank you.
Step 1 - Buy an Internet Security Suite: If you're unsure what an Internet Security Suite is, very briefly, it's usually a combination of a firewall and antivirus software. These products can be bought and installed on your computer separately but I always advise people to get a combined product as it's less complicated. An Internet Security Suite may even include other useful features like ad blocking, anti-spam, or even file backup and PC tune up facilities.
Step 2 - Password protect your user accounts: If you share your computer with one or more other people, it would be a very good idea to have your own password protected user account. When you share a computer, its security is no longer your sole responsibility; it's the responsibility of everyone who uses it. In such an environment, password protecting you own account will not prevent the other users from downloading malware but depending on the circumstances, it may at least prevent the loss of your own data.
If you're the owner of a shared computer it would be a very good idea to restrict the access of the other users. This means giving them limited accounts so that they can use the computer without being able to make changes to the system that will damage the computer or affect other users. Administrative accounts should only be given to those who really need it for a good reason.
Step 3 - Beware of suspicious emails: By far, the best way to deal with scam emails is by using common sense. However, here are some things to remember.
- Email addresses can be faked. Just because an email says it has come from customerservices@paypal.co.uk doesn't mean that it actually does
- Website addresses can be faked. Just because a link says http://www.yourbank.co.uk, doesn't mean that's where it will take you if you click on it
- By and large, banks will NEVER contact you by email and ask you to confirm any details of any kind
Do's and Don'ts
- DON'T respond to a suspicious email under any circumstance
- DON'T open any attachments from a suspicious email
- DON'T click on any links in a suspicious email
- DO delete any email you think is suspicious
- DO use email filtering software (antispam)
- DO contact your bank and ask them if the email they sent you is genuine
Step 4 - Use a pop-up blocker: Most browsers come with a facility to prevent these pop-ups from...well, "popping up." Check the help files for your particular browser to see if it has this facility and if it does, switch it on! Also, beware of messages that appear on websites offering you free antivirus software, free registry scans, etc. These messages are often designed to look like genuine messages from your own computer but they are most definitely not! Clicking on them will almost certainly infect your computer with malware.
Step 5 - Secure Your Wireless Network: It may interest you to know that armed with tools freely available on the internet, a hacker (not even a very good hacker) can access an unsecure wireless network with relative ease. Once access is gained he/she can potentially read the files on your computer, view the pages you've browsed on the internet, and even use your internet connection for a whole host of criminal activities. For instance, they could use your internet connection to send bulk emails, hack into other computers, download indecent images of children, and many more.
Secure your wireless network by placing password protection on it. Only computers with the password will be able to connect to the network.
If you follow these steps you'll be well along the way to securing your PC and your online world.
I hope you enjoyed reading this article and found it helpful and informative. However, the article has been cut down for this site. To read the full version, please visit the News & Articles section of the Quantum Concepts website.
Thank you.
Source...