Thursday, September 4, 2014

Protecting Portable Devices: Data Security

Why do you need another layer of protection?
Although there are ways to physically protect your laptop, PDA or other handheld device (see Protecting Portable Devices: Physical Security for more information), there is no guarantee that it will not be stolen. After all, as the name suggests, portable devices are designed to be easily transported. The theft itself is, at least, frustrating, uncomfortable and disconcerting, but the exposure of information on the device could have serious consequences. Also, remember that all devices connected to the Internet, especially if it is a wireless connection, are also susceptible to network attacks (see Securing Wireless Networks for more information).

What can be done?
Use passwords correctly - In the process of getting to the information on your mobile device, you will likely find several requests for passwords. Take advantage of this security. Do not choose options that allow your computer to remember your passwords, do not choose passwords that thieves could easily guess, use different passwords for different programs, and take advantage of additional authentication methods (see Selecting and password protection and supplement passwords for more information).
Consider storing important data separately - There are many forms of storage media, such as CDs, DVDs and removable flash drives (also known as thumb drives or USB keys). When you save your data on removable media and keep it in a different place (for example, in your suitcase instead of your laptop bag), you can protect your data even if your laptop is stolen. You should make sure the location where you store your data for easy access. It may be helpful to bring the storage media with other valuables that you keep with you at all times and that naturally protect, such as a wallet or keys.
You encrypt files - By encrypting files, you ensure that unauthorized people can not view data even if you have physical access. You may also want to consider the options for full disk encryption, which prevents a thief from even starting your laptop without a passphrase. When encryption is used, it is important to remember your passwords and passphrases; if you forget or lose them, you may lose your data.
Install and maintain anti-virus software - Protect laptops and PDAs from viruses in the same way to protect their desktop computers. Be sure to keep virus definitions up to date (see Understanding Anti-Virus Software for more information). If your anti-virus software does not include anti-spyware software, consider installing additional software to protect against this threat (see Recognizing and avoiding spyware and Coordinating Virus and Spyware Defense for more information).
Install and maintain a firewall - While it is always important to restrict incoming and outgoing traffic of your computer, firewalls are especially important if you are traveling and using different networks. The firewall can help prevent outsiders from unwanted access (see Understanding Firewalls for more information).
Backup your data - Make sure to backup the data on your computer that has a CD-ROM, DVD-ROM or network (see good safety habits and warnings real world stay safe online for more information) . This will not only ensure that you will continue to have access to information if the device is stolen, but could help identify exactly what information a thief may be able to access. You may be able to take steps to reduce the amount of damage that exposure could cause.

Why are security settings for web browsers important?

Your web browser is the primary connection to the rest of the Internet, and multiple applications may depend on your browser, or items within your browser to function. This makes it even more important security settings in your browser. Many web applications are trying to improve your browsing experience by allowing different types of functionality, but this functionality could be unnecessary and can leave you susceptible to be attacked. The safest policy is to disable most of these features unless it decides are necessary. If you determine that a site is trustworthy, you can choose to enable the functionality temporarily and then turn it off once you are done visiting the site.
 
Where can you find the settings?
Each web browser is different, so you may have to look around. For example, in Internet Explorer, you can find by clicking Tools on the menu bar, select Internet Options ..., choose the Security tab, and clicking on the Custom Level button .... But in Firefox click Tools on the menu bar and select Options .... Click the content, privacy, and safety data sheets to explore options basic safety. Browsers have different security options and configurations, so familiarize yourself with the menu options, see the help function, or see the website of the supplier.
Although each application has settings that are selected by default, you may discover that your browser also has preset security levels that can be selected. For example, Internet Explorer offers customized configurations to select a certain level of safety; features are enabled or disabled based on the selection. Even with these guidelines, it is useful to have an understanding of what the different terms mean so you can evaluate the characteristics to determine what adjustments are appropriate for you.

How to know what your settings should be?
Ideally establish its safety for the highest possible level. However, restricting certain features may limit some web pages to load or work properly. The best approach is to take the highest level of security features enabled and only when you require functionality.

What do the different terms?
Different browsers use different terms, but here are some terms and options that you can find:
Zones - your browser may give you the option of putting websites into different segments or zones, and allow to define different security restrictions for each zone.
For example, Internet Explorer identifies the following areas:
Internet - This is the general area for all public websites. When you surf the Internet, configuration of this zone are automatically applied to the sites you visit. To give you the best protection while browsing, you must configure security at the highest level; at least, must maintain an average level.
Local Intranet - If you are in an office environment that has its own intranet, this area contains the internal pages. Because the content of the website is kept in an internal web server, it is usually safe to have less restrictive environments for these pages. However, some viruses have taken advantage of this area, so be careful what sites are listed and what privileges are being given.
Trusted Sites - If you think some sites are designed with security in mind, and you feel that the content of the site can be trusted not to contain harmful materials can add them to your trusted sites and apply settings accordingly. They may also require that only sites that implement Secure Sockets Layer (SSL) can be active in this area. This allows you to verify that the site you are visiting is the site that claims to be (see How to protect your privacy and description certificates Web site for more information). This is an optional area, but can be useful if you personally keep several websites or if your organization has multiple sites. Even if you trust them, avoid applying security levels to low-external sites if you are attacked, you may also become a victim.
Restricted sites - If there are particular sites that you think might not be safe, you can identify and define the settings for reinforced security. Due to security settings may not be enough to protect you, the best precaution is to avoid navigation to any site that makes you wonder if they are safe.
JavaScript - Some websites are based on web scripts such as JavaScript to achieve a certain look or functionality, but these scripts can be used in the attacks (see Browsing Safely: Understanding Active Content and Cookies for more information) .
Java and ActiveX controls - These programs are used to develop or run active content that offers some features, but can put you at risk (see Browsing Safely: Understanding Active Content and Cookies for more information).
Plug-ins - Sometimes browsers require the installation of additional software known as plug-ins to provide additional functionality. Like Java and ActiveX controls, plug-ins can be used in an attack, so before installing, make sure that they are necessary and that the site you have to download them from is trustworthy.

You may also find options that allow you to take the following safety measures:
 Manage cookies - You can disable, restrict or allow cookies in your case. In general, it is best to disable cookies and then enable them if you visit a trusted site that requires them (see Browsing Safely: Understanding Active Content and Cookies for more information).
Block pop-ups - While Turning this feature may limit the functionality of certain web sites, but also minimize the number of pop-up ads you receive, some of which may be malicious

Tag

Anti Spyware Anti Trojan Elite Antivirus Apps for Android Phones Antivirus Apps for Samsung Antivirus Review Antivirus Support Avast AVG Avira Antivirus BestCrypt BitDefender Boot Sector Virus BullGuard Clamwin Classroom Spy Pro Cleanup inbox and manage emails Cloud Backup Cloud Computing Security Comodo Computer Certification Courses Conficker worm Cyber Bullying cyber security Data Protection DoctoAntivirus Downloads DR Drive Genius3 eScan Antivirus Fake Antivirus Fast PC Fat Data Recovery Firewall protecion Folder Guard Professional GFI Languard Hackers HitmanPro IDS IE antivirus Installerex IT Consultants K-Secure VPN K7 Antivirus Kaspersky Linux antivirus Loaris trojan malware Manually Virus Delete mcafee MCAfee SuperDAT Microsoft Security Essential Most Danger PC Viruses Netgate spy emergency NOD32 Norman Malware Norton Online Antivirus Panda Cloud antivirus PC Care PC Doctor Pc Resources PC Technician PC Tools Antivirus PC Virus PDA Antivirus Pop-Up Removal PrivateFirewall Protector Plus Registry Clean Remove Spyware Rootkit Virus Safe Emailing Security Shardana Antivirus Rescue Disk Smartphone security Social Network Safety spyhunter Spyware SuperantiSpyware Symantec The Cleaner 2011 Top Antivirus Top Destructive Viruses Trojan Horse Trojan Killer trust port Twitter Protection USB Security Vipre Internet Security Virus Definitions Virus Scanners VueScan Pro WEB Antivirus Website Security WinASO Registry optimizer windows 7 Windows 8 Protection Windows Vista Virus Windows.8.1 WinMend System Doctor Wireless Network Protection Zemana AntiLogger