10 tips on how to protect your computer!
Below are some important steps you should consider to protect your computer. While no individual step will eliminate your risk – together, these practices will minimize the threat of possible malicious exploitation.
10 tips to protect your computer :
- Connect to a Secure Network – Once your computer is connected to the Internet, it’s also connected to millions of other computers, which could give attackers access to your computer. Information flows from the Internet to your home network by first coming into your modem, then into your router and finally into your computer. Hence, it’s crucial to secure your router—the first securable device that receives information from the Internet – be sure to secure it.
- Enable and Configure a Firewall – A firewall is a device that controls the flow of information between your computer and the Internet, similar to a router. Most modern operating systems include a software firewall. In addition to the operating system’s firewall, the majority of home routers have a firewall built-in – therefore have a look at their docs and set-up a strong password to restrict any unauthorized access to them.
- Install and Use Antivirus and Antispyware – Installing an antivirus and/or antispyware software program and keeping it up to date is a critical step in protecting your computer. Be sure to keep them updated.
Note: For advance users, installing antivirus often doesn’t hold much value, since they look after their systems security under the lens of their own knowledge and capabilities. However, for basic and regular users, this step remains critical and you are encouraged to follow it, as it will help to secure your computer at least to some extent.
- Remove Unnecessary Software – Intruders can attack your computer by exploiting software vulnerabilities (that is, flaws or weaknesses), so the less software you have installed, the fewer avenues for a potential attack. Remove any software you feel isn’t necessary after confirming that it’s safe to remove. Likewise, disabling nonessential services and modifying unnecessary default features also eliminates several opportunities for attack.
- Operate Under the Principle of Least Privilege – In most instances of a malware infection, the malware can operate only under the rights of the logged-in user. To minimize the impact the malware can have if it successfully infects a computer, consider using a standard or restricted user account for day-to-day activities and only logging in with the admin account (which has full operating privileges on the system) when you need to install or remove software or change system settings on the computer.
- Secure Your Web Browser – Web browsers installed on new computers usually don’t have secure default settings. Securing your browser is another critical step in improving your computer’s security as an increasing number of attacks take advantage of web browsers. Make sure you use a trusted one and avoid unnecessary plugins/add-ons.
- Apply Software Updates and Enable Future Automatic Updates – Most software vendors release updates to patch or fix vulnerabilities, flaws, and weaknesses (bugs) in their software. Intruders can exploit these bugs to attack your computer, thus keeping your software updated is important to help prevent an attack.
- Use Good Security Practices in the World of the Wild Web – Take caution with email attachments and untrusted links. Malware is commonly spread by people clicking on an email attachment or a link that launches malware. Don’t open attachments or click on links unless you’re certain they’re safe, even if they come from a person you know. Also be careful when providing sensitive information online by using a secure encrypted email solution.
- Don’t install or use illegal and/or unauthorized software – This might compromise your data security and break the law.
- If it’s too sensitive, avoid keeping it in your device – It is advised that you do not keep any data on your personal device that you or your company would deem to be very sensitive. Rather keep it in your work-device or on an external device (in encrypted form) that is not connected to any network.
Your digital world has an eminent influence on your personal life – make sure to protect it !