10 Practical Computer Protection Tips

10 Practical Computer Protection Tips

On February 5, 2019, the world celebrated the “Safer Internet Day”. This day allowed netizens to be reminded that the Internet is a real digital jungle, but there are some rules we can follow to make this environment more civilized. Currently, viruses, malware and ransomware proliferate, causing problems for individuals, groups and organizations as they try to rebuild or restore damaged or deleted data.

Here in Hackercombat.com, we are honestly saying that 100% security is impossible to achieve, the only perfectly secure computing device is a device that is not powered-on at all.

However, this imperfect security atmosphere is not a valid alibi not to take action for our computer protection, each of us has our share of responsibility with regards to the security for computer’s health. We need to know what steps we can take to make our experience on the Internet safe, without the need for large investments in an official computer security basics course.

What is computer security? How can we secure our online experience? The following are the ‘health’ tips we offer for your computer protection, especially when online:

1. Handling Passwords

Here we have two options. Either we use a good password manager or we use some trick to remember them. It is dangerous to use the same password for all the services we use. There are several suitable tricks, such as using passwords cards or using phrases to make the password longer.

2. Social Network Safety

How would you like to hang a sign on your back announcing that you are going on vacation for 20 days? Would you send your photos in a swimsuit to the whole city? Why do you do it then in a social network? Social networks are very open. It is necessary to review the privacy clauses well and know what is shared and with whom. The friends of other people know how to take advantage of this type of networks, but it is not just that, you can get a lot of information from a person through social networks. Watch what you share, they can use it against you. Many practices of cyberbullying come from careless sharing of information online as fuel.

3. Never block a critical update

Activate automatic updates in all applications that you use daily. Make sure they are activated in your operating system, Internet browser, mail program, PDF reader and etc. You should install them whenever there is one available. The time lost by updating the system is negligible compared to the benefit provided by additional protection against malware , hackers.

4. Always maintain an open and constant communication line

The rules of which we have spoken are quite simple for all the people accustomed to using the Internet on a day-to-day basis. But they are not obvious to two groups that generally approach computers without the proper knowledge. Children and the elderly It is important to teach these two groups of people how to use the computer with caution and to protect themselves from online threats and cybercriminals. It is important to explain to them that not everything they see on the Internet is true. All the information obtained online must be verified.

5. The smartphone is the most ‘personal computer’ of all your computers

Repeat this mantra often. Mobile phones run programs. Also malware and viruses. This means that the same measures of protection that we must apply to computers (antivirus, updates, use software from reliable sites) are exactly as valid for phones. We currently store more critical personal information on the phone than on the computer, so repeat the mantra: A smartphone is a ‘personal computer’.

6. Scams are there, never be gullible

Scams will always be in our vicinity, whether online or in real life. Usually the messages that propose you to make money or save it, and sometimes with the condition that you send the message to many people, actually have a very different purpose. When you send them to your contacts you can harm them more than benefit them. In general, beware of chains and make sure that your content is reliable before forwarding the message.

7. Report Online Misbehaviors

Internet threats are not limited to fraud and viruses. Abusers, provocateurs, stalkers are more common subjects than we would like on the Internet. Children and adolescents are very vulnerable to these types of threats and are unable to react correctly to them. Most IT security forums and platforms allow blocking some users and even “reporting inappropriate behavior” to platform administrators. Use these resources without shame. They are for that. So that people who feel offended can protect themselves. First, it reports offensive or violent comments; Second, inform the attacker. These same rules apply to inappropriate content.

8. A clean computer is a malware free computer

Not only do we refer to keeping it presentable, that too. We have to have a good antivirus software installed and updated. If you use a computer other than your own, it is advisable to carry out a small security check (such as checking which antivirus software is installed and when the latest virus database updates were made) before entering the computer. he passwords or credit card numbers.

9. Real world rules also applies online

A simple rule in the real world. You do not instantly become friends with a stranger. Unconsciously, you get references, you study their attitudes, you know them. The same rule is valid on the Internet. Do not trust blindly someone you just met, do not send photos or share your location with him. Follow the same rules as in the physical world.

10. Never fall for malicious links

Currently, links on the Internet make our lives easier, allowing us to access services through a single click. Unfortunately, criminals know how to make good use of these links, directing users to sites riddled with malware or ransomware . There are ways to be relatively protected. It does not mean that you have to know each site on the Internet. Just do not click on any link that comes to you by mail or by an instant message that you have not requested. An example to illustrate this: if you receive a message from your bank about an “important issue, click here to read it”, simply enter the browser and access the site of your bank manually, do not click on the link. A second important type of fraudulent links on the Internet consists of advertisements and banners such as “your PC is in danger”, “collect your prize” or “make your PC faster”. Almost all are dangerous.

Related Resources:

5 Bad Computing Habits People Needs To Stop

Julia Sowells923 Posts

Julia Sowells has been a technology and security professional. For a decade of experience in technology, she has worked on dozens of large-scale enterprise security projects, and even writing technical articles and has worked as a technical editor for Rural Press Magazine. She now lives and works in New York, where she maintains her own consulting firm with her role as security consultant while continuing to write for Hacker Combat in her limited spare time.

0 Comments

Leave a Comment

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register