Top 10 Security Tips for your PC

By Unknown Tuesday, June 4, 2013 0 comments
pc security

1.  
Use "anti-virus software" and keep it updated. Make sure you have anti-virus software on your computer! Antivirus software is designed to protect you and your computer against known viruses,
so no need to worry. But with new viruses emerging daily programs, antivirus need regular updates, like annual flu vaccines to recognize these new viruses. Be sure to update your antivirus software regularly! Most of the time is kept up to date, say, once a week, the better. See the website of the company anti-virus software to see some sample descriptions of viruses and to get regular software updates. Stop viruses in their tracks!

2
.  

Do not open emails or attachments from unknown sources. Be suspicious of any email attachment unexpected, even if they appear to come from someone you know. A simple rule is that if you do not know the person you are sending an email, be very careful when opening email and attachments. If you receive a suspicious email, the best thing to do is delete the entire message, including attachments. . If you are determined to open a file from an unknown source, except that before running the virus check on the file, but I also understand that there is still a risk. If the mail appears to come from someone you know, still treat it with caution if you have a suspicious subject line (eg "Iloveyou" or "Anna Kounikova") or if ortherwise looks suspicious (for example, was sent by the middle to overnight). Also be careful if you receive multiple copies of the same message from known and unknown sources. Finally, remember that even friends and family may accidentally send an email virus or may have been sent from their machines without their knowledge. Such was the case with the "I Love You" virus that spread to millions of people in 2001. If in doubt, remove! If you receive an email from a trusted provider or organization, be careful with phishing, a scam high technology used to mislead consumers to provide personal information, including credit card numbers, etc. For more information about "phishing "Go to titiled FTC document" How not to get hooked by a phishing scam, "http://www.ftc.gov/bcp/conline/pubs/alerts/phishingalrt.pdf. The best way to ensure that you are dealing with a trusted merchant, not a thief, is to initiate the contact yourself. Enter the address of the trader in your Internet browser instead of clicking on a link in an email.

3

Protect your computer from Internet intruders -. "Firewall" use Equip your computer with a firewall! Firewalls create a protective wall between your computer and the outside world. They are available in two forms, software firewalls that run on personal computers and hardware firewalls that protect multiple computers simultaneously. They work by filtering unauthorized types or potentially dangerous Internet data, while allowing other data (good) to get to the computer. Firewalls also ensure that unauthorized persons can not gain access to your computer while you are connected to the Internet. You can find the hardware and software firewall on every computer stores and in some operating systems. Do not let intruders!

4
.  

Regularly download security updates and "patches" for operating systems and other software. Most software companies today the release updates and patches to close newly discovered vulnerabilities in its software. Sometimes we discover errors in a program that could allow a hacker to attack your computer criminal. Before most of these attacks occur, software companies or vendors create free patches that you post on your web pages. You should be sure to download and install the patches! Check out the websites of software providers' regular new security patches or use the automated patching features that some companies offer. Make sure you are getting the correct patch patches site update. Many systems have been compromised in the past year with the installation of the patches obtained from the update sites or fake emails that appear to come from a provider that offers links to fake websites. If you do not have the time to do the work yourself, download and install a utility that will do it for you. There are software programs available that can perform this task for you. Stay informed!

5
.  

Use hard to guess. Mix uppercase, lowercase, numbers and other characters that are not easy to find in a dictionary, and make sure they are at least eight characters long. Passwords are only kept out outside if they are difficult to guess! Do not share your password, and do not use the same password in more than one place. If someone should happen to guess one of your passwords, you do not want them to be able to use it elsewhere. The golden rules of passwords are:
  • The password must be at least 8 characters, both as a possible, and use uppercase and lowercase letters, symbols and numbers, for example, XK2 and LP97.
  •  Change passwords regularly, at least every 90 days.
  •  Do not give your password to anybody! For added security, use some form of two-factor authentication. The two-factor authentication is a way to access by combining something you know (PIN) and something you have (token or smart card).

6
.  

Backing up your computer data on disks or CDs regularly. Experienced users know that there are two kinds of people: those who have already lost data and those who are going to experience the pain of data loss in the future. Backing up small amounts of data on floppy disks and larger amounts on CDs. If you have access to a network, save copies of the data on another computer on the network. Many people make weekly backups of all important data. And make sure you have the original software disks to hand launch and available in case of damaged system files. Be Prepared!

7
.  

Do not share access to computers with strangers. Knowing the risks of file sharing. The computer operating system may allow other computers on a network such as the Internet, to access the hard drive of your computer in order to "share files". This ability to share files can be used to infect your computer with a virus or view files on your computer if you are not careful. So, unless you really need this capability, be sure to disable file sharing. Check that the operating system and the help file from another program to learn how to disable file sharing. Do not share access to your computer with strangers!

8
.  

Disconnect from the Internet when not in use. Remember the digital highway is a two way street. To send and receive information. Disconnect your computer from the Internet when you're not online reduces the possibility that someone could access your computer. And if you keep your anti-virus software up to date, or do not have a firewall, someone could infect your computer or use it to harm another person on the Internet. and protect others: disconnect!9.  
Check your security on a regular basis. When you change your clocks for daylight saving time to save time, re-evaluate the safety of your computer. The programs and computer operating system has many important features that make life easier, but it can also leave you vulnerable to viruses and hackers. You should evaluate your computer security at least twice a year - do it when you change the clocks for daylight savings! Check the configuration of the applications you have on your computer. Browser software, for example, typically has a security setting in its preferences area. Review the settings you have and make sure you have the appropriate level of protection for you. Set a high bar for you!10.  
Make sure your family and / or your employees know what to do if your computer is infected. It is important that everyone who uses a computer is aware of safety practices. People should know how to update virus protection software, how to download security patches from software vendors and how to create a valid password. Make sure they know these tips too! Sharing is sexy

Related posts

0 comments for this post

Leave a reply