Today, more and more people are using their computers for everything from communication to online banking and investing to searching. As we do these things on a more frequent basis, we open ourselves to prospective hackers, attackers and crackers.
While some may be hoping to phish your personal information and identity for resale, others intend to use your computer as a platform from which to attack other unknowing victims. Below are a few simple, cost-effective measures you can take to make your computer more secure.
1. Always make backups of important information and store it in a secure location away from your computer.
2. Update and patch your operating system, web browser and software frequently. If you have a Windows operating system, start by going to windowsupdate.microsoft.com and running the update wizard. This program will help you find the latest patches for your Windows operating system. Also go to officeupdate.microsoft.com to locate possible patches for your Microsoft Office programs.
3. Install a firewall. Without a good firewall, viruses, worms, Trojans, malware and adware can all access your computer from the Internet easily. Consideration should be given to the advantages and differences between hardware and software based firewall programs.
5. Install antivirus software and set for automatic updates so that you receive the most current virus files.
6. Do not open unidentified email attachments. It is simply not sufficient that you may know the address from which it originates because many viruses can be spread from a familiar address.
7. Do not run software from unknown sources. What is more, do not send these kinds of programs to friends and coworkers because they contain funny or amusing stories or jokes. They may contain a Trojan horse just waiting to infect a computer.
8. Disable hidden filename extensions. By default, the Windows operating system is set to ?hide file extensions for known file types?. Disable this preference so that file extensions show in Windows. Some file extensions will, by default, continue to remain hidden, but you are more likely to see any unusual file extensions that do not belong.
9. Turn off your computer and disconnect from the network when not using the computer. A hacker can not attack your computer if you are disconnected from the network or the computer is off.
10. Make a boot disk on a floppy disk or CD in case your computer is damaged or infected by a malevolent program. Obviously, you need to take this precaution before you experience a hostile violation of your system security.