10 tips on how to protect Your Computer!
Following are some important steps you should consider to protect your computer. While no individual step will eliminate your risk – together these practices will minimize the threat of possible malicious exploitation.
10 tips to protect your computer :
- Connect to a Secure Network – Once your computer is connected to the Internet, it’s also connected to millions of other computers, which could give attackers access to your computer. Information flows from the Internet to your home network by first coming into your modem, then into your router and finally into your computer. Hence, it’s crucial to secure your router—the first securable device that receives information from the Internet – be sure to secure it.
- Enable and Configure a Firewall – A firewall is a device that controls the flow of information between your computer and the Internet, similar to a router. Most modern operating systems include a software firewall. In addition to the operating system’s firewall, the majority of home routers have a firewall built-in – therefore have a look at their docs and set-up a strong password to restrict any unauthorized access to them.
- Install and Use Antivirus and Antispyware – Installing an antivirus and antispyware software program and keeping it up to date is a critical step in protecting your computer. Be sure to keep them updated.
Note: For advance users, installing antivirus often doesn’t hold much value, since they look after their systems security under the lens of their own knowledge and capabilities. However for basic and regular users, this step remains critical and we encourage them to follow it, as it will help them in raising the bar to some extent.
- Remove Unnecessary Software – Intruders can attack your computer by exploiting software vulnerabilities (that is, flaws or weaknesses), so the less software you have installed, the fewer avenues for potential attack. Remove any software you feel isn’t necessary after confirming it’s safe to remove the software. Likewise, removing unnecessary software and disabling nonessential services, modifying unnecessary default features also eliminates several opportunities for attack.
- Operate Under the Principle of Least Privilege – In most instances of a malware infection, the malware can operate only under the rights of the logged-in user. To minimize the impact the malware can have if it successfully infects a computer, consider using a standard or restricted user account for day-to-day activities and only logging in with the administrator account (which has full operating privileges on the system) when you need to install or remove software or change system settings from the computer.
- Secure Your Web Browser – Web browsers installed on new computers usually don’t have secure default settings. Securing your browser is another critical step in improving your computer’s security because an increasing number of attacks take advantage of web browsers – make sure you use a trusted one and avoid unnecessary plugins/add-ons.
- Apply Software Updates and Enable Future Automatic Updates – Most software vendors release updates to patch or fix vulnerabilities, flaws, and weaknesses (bugs) in their software. Because intruders can exploit these bugs to attack your computer, keeping your software updated is important to help prevent infection
- Use Good Security Practices in the World of Wild Web – Use caution with email attachments and untrusted links. Malware is commonly spread by people clicking on an email attachment or a link that launches the malware. Don’t open attachments or click on links unless you’re certain they’re safe, even if they come from a person you know. Also, use caution when providing sensitive information, by using a secure encrypted email solution.
- Don’t install or use illegal and/or unauthorized software – Might compromise your data security and break the law.
- If its too sensitive, avoid keeping it in your device – Certain data if being to too sensitive/confidential to you or either your company, is advised to be not kept your personal device. Either keep it in your work-device or in an external device (in encrypted form) that is not connected to any network.
Your digital world has an eminent influence on your personal life – make sure to Protect It !