Today, more and more individuals are using their computers for everything from emailing to online banking and investing to searching. As we do these things on a more frequent footing, we open ourselves to potential hackers, attackers and crackers.
While some may be looking to phish your personal information and identity for resale, others want to use your computer as a platform from which to attack other unsuspecting targets. Hereunder are a few easy, cost-effective steps you can take to make your computer more secure.
1. Always make backups of important information and store it in a secure location away from your computer.
2. Update and patch your operating system, web browser and software frequently. If you have a Windows operating system, start by going to windowsupdate.microsoft.com and running the update wizard. This program will help you find the latest patches for your Windows operating system. Also go to officeupdate.microsoft.com to locate possible patches for your Microsoft Office software.
3. Set up a firewall. Without a good firewall, viruses, worms, Trojans, malware and adware can all access your computer from the Internet with no trouble. Consideration should be given to the benefits and differences between hardware and software based firewall programs.
5. Install antivirus software and set for automatic updates so that you receive the most current virus files.
6. Do not open unidentified email attachments. It is simply not sufficient that you may know the address from which it originates because many viruses can be spread from a familiar address.
7. Do not run software from unidentified sources. What is more, do not send these types of programs to friends and colleagues because they contain funny or amusing stories or jokes. They may contain a Trojan horse just waiting to infect a computer.
8. Disable hidden filename extensions. By default, the Windows operating system is set to ?hide file extensions for known file types?. Disable this preference so that file extensions show in Windows. Some file extensions will, by default, continue to remain hidden, but you are more likely to see any unusual file extensions that do not belong.
9. Switch off your computer and disconnect from the network when not using the computer. A hacker can not strike at your computer when you are disconnected from the network or the computer is off.
10. Create a boot disk on a floppy disk or CD in case your computer is damaged or compromised by a malevolent program. Clearly, you have to take this step before you experience a hostile breach of your system security.
If you are looking for new custom PC cases, or any other type of computer case, just go over to our website now at Clear Computer Case for more information.
categories: software,security,computers,office,computer games,internet,multimedia,kids and teens,fashion,style,other