Install or Update Your
Antivirus Software: Antivirus software is designed to prevent malicious
software programs from embedding on your computer. If it detects malicious
code, like a virus or a worm, it works to disarm or remove it. Viruses can
infect computers without users’ knowledge. Most types of antivirus software can
be set up to update automatically.
Keep Your Firewall Turned On: A firewall helps protect your computer from hackers who might try to gain access to crash it, delete information, or even steal passwords or other sensitive information. Software firewalls are widely recommended for single computers. The software is prepackaged on some operating systems or can be purchased for individual computers. For multiple networked computers, hardware routers typically provide firewall protection.
Keep Your Firewall Turned On: A firewall helps protect your computer from hackers who might try to gain access to crash it, delete information, or even steal passwords or other sensitive information. Software firewalls are widely recommended for single computers. The software is prepackaged on some operating systems or can be purchased for individual computers. For multiple networked computers, hardware routers typically provide firewall protection.
Prevent hacking of your G-Mail Account: Someone
mail you that we have a business opportunity for you. And say click on this
link for more details. Whenever you click on that link, a Gmail screen shown
including message “Your session has expired login again”. It’s a clone of Gmail
screen that can hack your password.
Be Careful What You Download: Carelessly
downloading e-mail attachments can circumvent even the most vigilant anti-virus
software. Never open an e-mail attachment from someone you don’t know, and be
wary of forwarded attachments from people you do know. They may have
unwittingly advanced malicious code.
Turn Off Your Computer: With the growth of high-speed Internet connections, many opt to leave their computers on and ready for action. The downside is that being “always on” renders computers more susceptible. Beyond firewall protection, which is designed to fend off unwanted attacks, turning the computer off effectively severs an attacker’s connection—be it spyware or a botnet that employs your computer’s resources to reach out to other unwitting users.
Install or Update Your Antispyware Technology: Spyware is just what it sounds like—software that is surreptitiously installed on your computer to let others peer into your activities on the computer. Some spyware collects information about you without your consent or produces unwanted pop-up ads on your web browser. Some operating systems offer free spyware protection, and inexpensive software is readily available for download on the Internet or at your local computer store. Be wary of ads on the Internet offering downloadable antispyware—in some cases these products may be fake and may actually contain spyware or other malicious code. It’s like buying groceries—shop where you trust.
Keep Your Operating System Up to Date: Computer operating systems are periodically updated to stay in tune with technology requirements and to fix security holes. Be sure to install the updates to ensure your computer has the latest protection.
Don’t Judge on Prize or Lottery E-mail: Someone mail you that you won the Lottery. And request you to give information regarding bank account or others. They keep your data’s and demanding some money for Draft charges. It’s totally fraud.
Turn Off Your Computer: With the growth of high-speed Internet connections, many opt to leave their computers on and ready for action. The downside is that being “always on” renders computers more susceptible. Beyond firewall protection, which is designed to fend off unwanted attacks, turning the computer off effectively severs an attacker’s connection—be it spyware or a botnet that employs your computer’s resources to reach out to other unwitting users.
Install or Update Your Antispyware Technology: Spyware is just what it sounds like—software that is surreptitiously installed on your computer to let others peer into your activities on the computer. Some spyware collects information about you without your consent or produces unwanted pop-up ads on your web browser. Some operating systems offer free spyware protection, and inexpensive software is readily available for download on the Internet or at your local computer store. Be wary of ads on the Internet offering downloadable antispyware—in some cases these products may be fake and may actually contain spyware or other malicious code. It’s like buying groceries—shop where you trust.
Keep Your Operating System Up to Date: Computer operating systems are periodically updated to stay in tune with technology requirements and to fix security holes. Be sure to install the updates to ensure your computer has the latest protection.
Don’t Judge on Prize or Lottery E-mail: Someone mail you that you won the Lottery. And request you to give information regarding bank account or others. They keep your data’s and demanding some money for Draft charges. It’s totally fraud.
Use Complex and Secure Passwords: The
first line of defense in maintaining system security is to have strong and
complex passwords. Complex passwords are difficult for the hackers to find. Use
a password that is at least 8 characters in length and include a combination of
numbers, letters that are both upper and lower case and a special character.
Hackers use certain tools to break easy passwords in few minutes. One recent
study showed that a 6-character password with all lower case letters can be
broken in under 6 minutes!
Check on the Security Settings of the Browser:
Browsers have various security and privacy settings that you
should review and set to the level you desire. Recent browsers give your
ability to tell web sites to not track your movements, increasing your privacy
and security.
Don’t link accounts:
If you want to comment on an article and
you’re prompted to sign in with Twitter or Facebook, do not go behind the door.
“Convenience always lessens your security posture,” says Taggart. “Linking
accounts allows services to acquire a staggering amount of personal
information.”
Keep sensitive data off the cloud:
“No matter which way you cut it, data stored on the cloud
doesn’t belong to you,” says Taggart. “There are very few cloud storage
solutions that offer encryption for ‘data at rest.’ Use the cloud accordingly.
If it’s important, don’t.”
0 comments:
Post a Comment