|How to fight computer viruses, spyware and malware |
| Page: 10 Easy Steps for Securing Your Computer|
Securing Your Computer
10 Easy Steps for
Securing Your Computer System
Today, more and more people are using their computers for everything
from communication to online banking and investing to shopping. As we do these things on a more regular basis, we
open ourselves up to potential hackers, attackers and crackers. While some may be looking to phish your personal
information and identity for resale, others simply just want to use your computer as a platform from which to
attack other unknowing targets.
Whatever the threat, it pays well to immediately take steps and
protect your computer from these attacks. We provide you here with some basic information on you can do that on
your home computer. For the enterprise computer system protection, check our Intrusion Detection
Easy Steps to Secure Your Computer
Below are a few easy, cost-effective steps you can take to make your computer
It's important that you take all necessary steps to secure your computer
from various online threats
- Back-up important information -Always make backups of important information and store in a safe place separate from your
computer. Update your back up periodically, depending on how often you add new stuff on your
- Update operating system -
Update and patch your operating system, web browser and software frequently. If you have a Windows operating
system, start by going to www.windowsupdate.microsoft.com and running the
update wizard. This program will help you find the latest patches for your Windows computer. Also go
to www.officeupdate.microsoft.com to locate possible patches for your Office programs.
- Get a firewall installed - Install a firewall on your computer. Without a good firewall, viruses, worms, Trojans,
malware and adware can all easily access your computer from the Internet. Consideration should be given to the
benefits and differences between hardware and software based firewall programs.
- Check browser and email settings - Review your browser and email settings for optimum security. Why should you do this?
cookies are relatively harmless in terms of security concerns, they do still track your movements on the
Internet to build a profile of you. At a minimum set your security setting for the "internet zone" to High, and
your "trusted sites zone" to Medium Low.
- Install antivirus program - It goes without saying that you should install good antivirus software and set for
automatic updates so that you receive the most current versions. This should be one of the most essential,
always-active features of your computer security.
- Do not open email attachments - Unless you 100% trust the sender, do not open unknown email attachments. It is simply
not enough that you may recognize the address from which it originates because many viruses can spread from a
- Do not run unknown programs - Do not run on your computer system programs from unknown origins. Also, do not send
these types of programs to friends and coworkers because they contain funny or amusing stories or jokes. They
may contain a Trojans horse waiting to infect a computer.
- Disable hidden filename extensions
- By default, the Windows operating system is set to
"hide file extensions for known file types". Disable this option so that file extensions display in
Windows. Some file extensions will, by default, continue to remain hidden, but you are more likely to see
any unusual file extensions that do not belong.
- Do not leave your computer on if not being used
- Turn off your computer and disconnect from the network
when not using the computer. A hacker can not attack your computer when you are disconnected from the network
or the computer is off.
- Make a boot disk - Consider making a boot disk on a floppy disk in case your computer is damaged or
compromised by a malicious program. Obviously, you need to take this step before you experience a hostile
breach of your system.
Computer Security Threats
Computer Security Watch
Crackdown on Security
Intrusion Detection Systems
Securing Your Computer
Online Security Rules
Computer Virus Prevention
Computer Virus Protection
Antivirus Programs Tips
Anti Spam Software
Microsoft Office 2003
Software Testing Service
Business Internet Security
Company Sued for Data Breach
Cyber Security Affects Reputation
Cyber Security and Small Business
Cyber Security Culture Change
Cyber Security for E-Commerce
Cyber Security Future Trends
File Sharing Security
Handle Company Data Breach
Internet Security Issues
Third Party Vendor Security
Wireless Hot Spots
Protect iPhone from Viruses
Stay Secure While Travelling
All About Web Hosting
Choosing Hosting Packages
Web Hosting Services
Website Security Myths
Link to us
Link to us