=> Don’t run unfamiliar
programs on your computer.
It sounds like common sense, but many of the most prominent attacks have involved spyware and email attachment worms such as Bagle and Netsky. If you don’t recognize the sender, don’t download its attachments.
It sounds like common sense, but many of the most prominent attacks have involved spyware and email attachment worms such as Bagle and Netsky. If you don’t recognize the sender, don’t download its attachments.
=> Don’t allow unrestricted physical access to your computer.
If you have sensitive or proprietary information on your computer, allowing other
employees or family members to use your computer can lead to potential breaches in your computer’s security.
=> Don’t use weak
passwords.
Use passwords which are difficult for someone to figure out. People frequently use the names of children, pets, anniversary dates, or birthdays. Because there seems to be a password needed for everything, it is not uncommon to see many people using the same password for everything. Big mistake! The use of only one password provides a hacker with easy access to a smorgasbord of personal information. If you have to write your passwords down, it is best not to leave them on a post-it, attached to the screen of your computer. You may chuckle at the absurdity, but it happens more than you think.
Use passwords which are difficult for someone to figure out. People frequently use the names of children, pets, anniversary dates, or birthdays. Because there seems to be a password needed for everything, it is not uncommon to see many people using the same password for everything. Big mistake! The use of only one password provides a hacker with easy access to a smorgasbord of personal information. If you have to write your passwords down, it is best not to leave them on a post-it, attached to the screen of your computer. You may chuckle at the absurdity, but it happens more than you think.
Many industry experts believe that most network security attacks would be stopped if computer users would just keep their computers updated with patches and security fixes. Too often, we forget to do this on a regular basis. Remember that every day, new viruses, worms and Trojans are being created and distributed. They are looking for the weaknesses in your computer system. Having outdated software is basically the same as holding the door open and inviting them in for a visit.
=>Don’t forget to make regular backups of important data
Always keep a copy of important
files on removable media such as floppy/ZIP disks or recordable CD-ROM
disks. Store the backups in a location
separate from the computer.
In most cases, Windows
desktop and screen-saver passwords provides adequate protection for normal
security concerns. However, if you feel
more comfortable taking additional security measures consider obtaining a
comprehensive security suite.
Selecting a Antivirus Software
The next question is how do
you pick the best product for your needs?
You start by asking yourself a series of questions. Do you need password protection for individual
files, your desktop, a network, or to block someone’s access to the
Internet? Is your computer used only by
you or do multiple users have access to the computer? How many users in total do you expect on
your computer? What are your system requirements? How much do you want to spend?
Once you are able to answer
these questions, you can begin to research which security suite will best meet
your needs. Product reviews and user
statements provide a great starting point.
PC Magazine (www.pcmag.com), Zdnet.com (www.zdnet.com), and Consumer
Reports (www.consumerreports.org) are just a few informative sites that offer research
on various computer software products.
There are numerous security
suites available on the market. Take the
time to choose the one that meets your specific needs. As a starting point, we’ve listed a couple of
the more popular programs.
Links:- http://imtiaztips.blogspot.in/
No comments:
Post a Comment