Securing Your Computer System
Today, more and more people rely on their computers for everything from communication to online banking, investing, and shopping. However, engaging in these activities increases the risk of encountering hackers, attackers, and crackers. Some may attempt phishing for your personal information and identity for resale, while others may use your computer to target unsuspecting victims. Below are several easy and cost-effective steps to enhance your computer’s security.
1. Backup Important Information:
Always create backups of your essential data and store them in a safe location separate from your computer.
2. Update Your Software:
Regularly update and patch your operating system, web browser, and other software. For Windows users, start by visiting www.windowsupdate.microsoft.com to run the update wizard, which will help you find the latest patches. Additionally, check www.officeupdate.microsoft.com for potential patches for your Office programs.
3. Install a Firewall:
A robust firewall is essential to protect your computer from viruses, worms, Trojans, malware, and adware that can easily access your system via the Internet. Consider the benefits and differences between hardware and software firewall programs.
4. Adjust Browser and Email Settings:
Review your browser and email settings for optimal security. Hackers often use Active-X and JavaScript to plant malicious programs on your computer. While cookies are generally harmless, they can track your online movements to create a profile of you. At a minimum, set your security level for the “Internet Zone” to High and your “Trusted Sites Zone” to Medium-Low.
5. Install Antivirus Software:
Please install antivirus software and set it for automatic updates to receive the most current versions.
6. Be Cautious with Email Attachments:
Do not open attachments from unknown sources. Many viruses can spread from familiar contacts, even if you recognize the sender’s address.
7. Avoid Running Unknown Programs:
Do not run programs from unknown origins, and refrain from sending these files to friends or coworkers, even if they contain amusing stories or jokes. They may harbor Trojans waiting to infect your computer.
8. Disable Hidden Filename Extensions:
By default, Windows hides file extensions for known file types. Turn off this option so that you can see all file extensions. Although some extensions may remain hidden, this will help you identify any unusual file types.
9. Disconnect When Not in Use:
Please turn off your computer and disconnect it from the network when you are not using it. A hacker cannot attack your computer if turned off or disconnected.
10. Create a Boot Disk:
Consider creating a boot disk on a floppy disk if your computer gets damaged or compromised by a malicious program. Remember, this should be done before you experience any hostile system breaches.
One Comment