Sunday, October 19, 2014

Good Security Habits

How can you minimize the access other people have your information?
You might be able to easily identify people who might legitimately or may not have physical access to your computer-family members, roommates, colleagues, members of a cleaning crew, and perhaps others. Identify people who may have remote access to your computer becomes much more difficult. As long as you have a computer and connect to a network, you are vulnerable to someone or something else access or corrupt your data; However, you can develop habits that make it harder.

Lock your computer when you are away from it. Even if you are away from your computer for a few minutes is enough time for someone else to destroy or corrupt your data. Locking your computer prevents another person from being able to just sit at your computer and access all of your information.
Unplug your computer from the Internet when not in use. The development of technologies such as DSL and cable modems have enabled users to be online all the time, but this convenience comes with risks. The likelihood that attackers or virus scan the network for available computers will target your computer becomes much higher if your computer is still connected. Depending on the method you use to connect to the Internet, disconnecting may mean disabling a wireless connection, turn off your computer or modem, or disconnecting cables. When you are online, make sure you have a firewall enabled (see Understanding Firewalls for more information).
Evaluate your security settings. Most software, including browsers and email programs, offers a variety of features that you can adapt to your needs and requirements. Enabling certain features to increase convenience or functionality may leave you more susceptible to attack. It is important to consider the parameters, especially the security settings and select the options that meet your needs without putting you at increased risk. If you install a patch or a new version of the software, or if you hear something that might affect your settings, reevaluate your settings to make sure they are still appropriate (see Understanding Patches, backing up your data and evaluation of the security of your Web browser settings for more information).
What other steps can you take?
Sometimes the threats to your information is not other people, but to natural or technological causes. Although there is no way to control or prevent these problems, you can prepare for them and try to minimize the damage.
Protect your computer against power surges and short interruptions. In addition to providing outlets for your computer and all peripheral devices, power strips protect your computer against surges. Many power strips now advertise compensation if they do not effectively protect your computer. Energy bands are not enough to protect against power outages, but there are products that offer backup power in case of power increase or outages. During a storm or construction which increases the chances of surges, consider turning off your computer down and disconnect it from any power source.
Back up all your data. If you take steps to protect yourself, there will always be a chance that something will happen to destroy your data. You've probably experienced this at least once through losing one or more files due to an accident, a virus or worm, a natural event, or a problem with your equipment. Regularly backing up your data on a CD or reduces stress and other negative consequences that result from losing important information network (see Warnings real world keep you safe online for more information). Determining how often to back up your data is a personal decision. If you are constantly adding or changing data, you may find weekly backups to be the best alternative; if your content rarely changes, you may decide that your backups do not need to be as frequent. You do not need to back up software that you own on CD-ROM or DVD-ROM, you can reinstall the software from the original media if necessary.

No comments:

Post a Comment


Anti Spyware Anti Trojan Elite Antivirus Apps for Android Phones Antivirus Apps for Samsung Antivirus Review Antivirus Support Avast AVG Avira Antivirus BestCrypt BitDefender Boot Sector Virus BullGuard Clamwin Classroom Spy Pro Cleanup inbox and manage emails Cloud Backup Cloud Computing Security Comodo Computer Certification Courses Conficker worm Cyber Bullying cyber security Data Protection DoctoAntivirus Downloads DR Drive Genius3 eScan Antivirus Fake Antivirus Fast PC Fat Data Recovery Firewall protecion Folder Guard Professional GFI Languard Hackers HitmanPro IDS IE antivirus Installerex IT Consultants K-Secure VPN K7 Antivirus Kaspersky Linux antivirus Loaris trojan malware Manually Virus Delete mcafee MCAfee SuperDAT Microsoft Security Essential Most Danger PC Viruses Netgate spy emergency NOD32 Norman Malware Norton Online Antivirus Panda Cloud antivirus PC Care PC Doctor Pc Resources PC Technician PC Tools Antivirus PC Virus PDA Antivirus Pop-Up Removal PrivateFirewall Protector Plus Registry Clean Remove Spyware Rootkit Virus Safe Emailing Security Shardana Antivirus Rescue Disk Smartphone security Social Network Safety spyhunter Spyware SuperantiSpyware Symantec The Cleaner 2011 Top Antivirus Top Destructive Viruses Trojan Horse Trojan Killer trust port Twitter Protection USB Security Vipre Internet Security Virus Definitions Virus Scanners VueScan Pro WEB Antivirus Website Security WinASO Registry optimizer windows 7 Windows 8 Protection Windows Vista Virus Windows.8.1 WinMend System Doctor Wireless Network Protection Zemana AntiLogger