Home » Computers

Top Ten Tips for Computer Security

Sep 13, 2008
Have you ever wondered why there is a huge increase in online fraud? Well the main reason its happening, is that most computer users are not protecting themselves properly.

When you follow the top 10 tips for online and offline protection, you will discover were your computer system weaknesses are.

1. It is a proven fact that 75% of American PC users do not use an up to date anti-virus program, this is a program that scans the PC searching for any malicious software, when it discovers them they can either quarantine them or delete them. Some AV programs even scan sites you visit and detect any phishing sites.

2. Phishing sites are websites that have been created to look similar to a bank or payment processor such as PayPal. We have all received the emails from our bank stating our account is empty and to log in immediately, the hyperlink in the email you click on looks real, however the site you are taken to is fraudulent, they are after stealing your money! Always make sure your banks website has a padlock image on the toolbar, this shows that it is a secure site for logging in. If you have any doubts contact your bank immediately.

3. We all need a firewall to hide behind. This is a piece of software that prevents anyone hacking into our computers, either at home or at work. Once the software is set up it runs in the background. It basically blocks the ports on our computers that hackers use to gain access through the back door. Like the AV, there are plenty of free firewalls.

4. Is your computer operating system up to date? When did you last update it? Most people will answer, never. The main reason software manufacturers such as Microsoft provide updates, is to plug any security vulnerabilities in the software, this is why when they issue an update, its wise to update your system.

5. Check any public computers you use, as there are products out there called key loggers, this is an electronic device that logs all keystrokes and can be downloaded. So if you use the library for your online bank or eBay, make sure the keyboard lead connects directly into the computer, if it connects to an extra piece of cable, it could be a key logger. The person who put it there only has to download the information and they have all your details and access to your money! Always log out and do not save any passwords on a public computer - Ever!

6. Check public WiFi connections are public! Make sure it is not just another computer acting as a gateway, so you pass your details to them such a credit card and address, then they grant you access to the internet. While you are sending emails, they are using your credit card details to purchase products online!

7. Do not share games, as this is how some viruses were transferred from computer to computer. Always run your anti virus software to scan the disc first.

8. Do not let anyone one use a flash drive on your computer, as soon as someone plugs a flash drive into a computer a virus could be transferring to your computer, this may or may not be done on purpose, but the problem is still there, it will take information from your computer and can even email it from your computer, at a later date!

9. Physical protection at home and at work, this is essential for preventing your computer and the data stored on it falling into the wrong hands. The PC enclosure is a special steel box, that has been designed for protecting computers, so heating and security issues has been addresses, these units are fully welded and normally bolted to walls, (this is how banks protect their computers).

10. Physical protection on the move is essential for laptops, so Kingston Security offers the best option, this is a high grade steel cable that locks into the laptop and ties around a leg of a table, this prevents your personal information being stolen along with the laptop, in a smash and grab robbery.

Follow these simple steps and your online and offline security will be safe.
About the Author
Now offering Computer Security & Solutions such as PC enclosures to protect your computers from damage and data lose.
Rating:
Please Rate:
(Average: Not rated)
Views: 168
Print Email Report Share
Article Categories
    • Artists
    • Gambling
    • Humanities
    • Humor
    • Movies
    • Music
    • Photography
    • Tattoos
    • Television
    • Classic Cars
    • Motorcycles
    • Recreational Vehicles
    • SUVs
    • Trucks
    • Vans
    • Branding
    • Business Opportunities
    • Careers and Jobs
    • Corporate
    • Customer Service
    • Direct Mail
    • Entrepreneurship
    • Ethics
    • Financing
    • Franchising
    • Home-Based Business
    • Human Resources
    • Import and Export
    • Leadership
    • Management
    • Market Research
    • Marketing and Advertising
    • Negotiation
    • Network Marketing
    • Networking
    • Organizational
    • Presentation
    • Project Management
    • Public Relations
    • Small Business
    • Strategic Planning
    • Team Building
    • Telemarketing
    • Training
    • Ask an Expert
    • College and University
    • Home Schooling
    • K-12
    • Languages
    • Online Education
    • Psychology
    • Accounting
    • Credit
    • Currency Trading
    • Debt Consolidation
    • Insurance
    • Investing
    • Leasing
    • Loans
    • Mortgage
    • Mutual Funds
    • Personal Finance
    • Stock Market
    • Structured Settlements
    • Taxes
    • Wealth Building
    • Coffee
    • Cooking
    • Gourmet
    • Recipes
    • Wine and Spirits
    • Acne
    • Aerobics
    • Alternative Medicine
    • Beauty
    • Cancer
    • Cosmetics
    • Depression
    • Diabetes
    • Diseases and Conditions
    • Fitness Equipment
    • Fitness
    • Hair Loss
    • Heart Disease
    • Medicine
    • Men's Health
    • Muscle Building
    • Nutrition
    • Skin Care
    • Supplements and Vitamins
    • Weight Loss
    • Women's Health
    • Yoga
    • Arts and Crafts
    • Babies
    • Collecting
    • Elderly Care
    • Genealogy
    • Hobbies
    • Parenting
    • Pets
    • Pregnancy
    • Woodworking
    • Feng Shui
    • Gardening
    • Home Appliances
    • Home Security
    • Interior Design
    • Landscaping
    • Affiliate Programs
    • Article Marketing
    • Auctions
    • Audio
    • Banner Advertising
    • Blogging
    • Broadband
    • Domain Names
    • E-Books
    • E-Commerce
    • Email Marketing
    • Ezines and Newsletters
    • Forums
    • Internet Marketing
    • Link Popularity
    • Pay-Per-Click
    • Podcasting
    • RSS
    • Search Engine Marketing
    • Search Engine Optimization
    • Security
    • Social Media
    • Spam
    • Video
    • Viral Marketing
    • Web Design
    • Web Development
    • Web Hosting
    • Copyright
    • Cyber Law
    • Intellectual Property
    • National, State, Local
    • Patents
    • Regulatory Compliance
    • Trademarks
    • Buying
    • Selling
    • Baseball
    • Basketball
    • Boating
    • Cycling
    • Extreme Sports
    • Fishing
    • Football
    • Golf
    • Hockey
    • Hunting
    • Martial Arts
    • Running
    • Scuba Diving
    • Soccer
    • Swimming
    • Tennis
    • Dating
    • Divorce
    • Marriage
    • Weddings
    • Astrology
    • Buddhism
    • Christianity
    • Faith
    • Hinduism
    • Islam
    • Judaism
    • Meditation
    • Metaphysical
    • New Age
    • Cable and Satellite TV
    • Cell Phones
    • Communication
    • Gadgets and Gizmos
    • GPS
    • Satellite Radio
    • Video Conferencing
    • VoIP
    • Addictions
    • Coaching
    • Goal Setting
    • Motivational
    • Stress Management
    • Time Management
    • Clothing
    • Electronics
    • Fashion
    • Gifts
    • Jewelry
    • Causes and Organizations
    • Environment
    • History
    • Holidays
    • Men's Issues
    • Nature
    • Philosophy
    • Politics
    • Women's Issues
    • World Affairs
    • Air Travel
    • Camping
    • Cruises
    • Destinations
    • Outdoors
    • Article Writing
    • Book Reviews
    • Copywriting
    • Fiction
    • Non-Fiction
    • Poetry
    • Quotes
    • Screenplay
    • Tools and Resources