Data security and access control tips


Take Better Control of Your Computer Security
The basics of computer protection 

Computers and similar devices are integral to modern living. We have leaned our entire weight on their functionality and moulded our schedules and activities on their ability to service us. It is only proper that we spend time, money, and effort in making sure that they are in top shape. After all, we remain the principal benefactor of a safe computer system. It is through the security measures that our computers employ that we are able to surf the internet and proceed with our activities without having to worry about the latest cyber crimes in the web.

Luckily, you can gear up your computer like an expert through simple yet mindful measures.

Do not use the same password for everything

             An attendee of a training program for a new software package to set up login accounts mentioned using the same password for everything to make it easy to remember. As a security professional, I said that this was a bad idea because, if the password was disclosed, the "bad guy" would have the keys to all their information. The attendee scoffed and told me it did not matter because the password was a word from a foreign language. The person then sat down to create his account on the computer that was attached to the overhead projector. He typed his password into a non-masked field, exposing it to everyone in the room. My security advice was proven true.



It takes two to tango and two firewalls to secure your system
             Contrary to the myth that hardware firewalls are better than software firewalls, both are equally necessary to secure your system because they provide different kinds of protection. Any size network — whether it's one or two computers on a home network or 100 computers in a business — needs to be protected by a hardware firewall, and every connected computer needs to be protected by a software firewall.



Don't download files from unknown sources
             Not all web sites are safe. Always ensure that the source you are downloading from is legitimate. Use extreme caution if you are referred to a site by an email message. If you're uncertain, don't download.



Be Skeptical When You Read Your Email
             Keep asking Why should I believe that? It is important to remember that you can't trust the "from" address on e-mail from outside the organization, as it is often faked by fraudsters and viruses. If you didn't expect a message, link, or attachment from someone, ask yourself why you should trust that it really came from the apparent sender, and that it's safe. When in doubt, it's a good idea to call and verify that they sent you the message.

Read error messages and checkboxes
             When you see an error message pop up on the screen, read it! You may not understand everything, but if you look through the message, you can get the gist. Hackers can sometimes generate errors to collect everything you type and everything that comes up on your screen. If you don't understand the error, at least capture the screen. To do that, hold down the shift key and press the key labeled "Print Screen" or "PrtSc". That will put the screen into short-term storage called the clipboard. Then open an e-mail message, right click on the message body and select "paste". Now you can print it or send it to tech support for further analysis.

Use a strong voicemail password. This helps prevent crooks from hijacking your phone line or voicemail
             A busy person set his voicemail password to match his extension. It seemed easy to remember but was also easy to guess. A prison inmate guessed the password and began using the account to communicate with fellow criminals—leaving messages for them and deleting legitimate messages.
             The receptionist at a small business came into the office at 8:30 a.m. and the phones were ringing off the hook. She picked up one of the lines and was surprised to hear people talking in a foreign language. Turns out fraudsters were using the phone system to steal international long-distance phone time.

Stay safe when buying or selling online
             Internet auction sites and online stores make shopping a breeze during the holiday season. But buying or selling merchandise online can have risks. Visit the following sites to learn more about keeping your online accounts and personal information secure and how to guard against fraud.




Don't use unauthorized software
             It may be tempting to use useful-looking software that you can get free on the Internet, but these tools may carry a hidden cost. Installing them may often cause other programs to stop working and it can take a long time for your IT teams to track down the problem. More seriously, they can display unwanted ads, slow your PC down or make it less secure by letting the PC download more ads from the Internet. Most seriously, they can be infected by viruses or spyware that are intended to damage your PC or steal confidential information.

Some Tips to Protect against Identity Theft

  1.              Do not sign the back of your credit cards. Instead put "PHOTO ID REQUIRED"; although merchants and their employees are still hit-and-miss on actually checking that ID, more of them are paying attention.
  2.              When you order your checks, don't list any telephone number. You can always write it on the check at the time of the transaction. If you have a PO Box, use that instead of your home address or your work address.
  3.              Be aware of which credit cards you carry now have embedded RFID chips because the information on one of those chips can be read surreptitiously by someone near you using a simple hand-held scanner.
  4.              Place the contents of your wallet on a photocopy machine. Do both sides of each license, credit card, etc. You will know what you had in your wallet and all of the account numbers and phone numbers to call and cancel. Store those photo copies in a secure place and refresh it when you change cards.



1. Your Main Defence Against Malware
             Computer virus protection is necessary particularly because malware is the number one tool used to accomplish majority of the cyber crimes that threaten us today. The battle doesn’t end the moment that you install an antivirus software; it is only the beginning of a continuous commitment to the overall security of your computer. You have to read about the software you’ve opted to use and the many ways you can navigate its features to your advantage. What are the options it gives you in accordance to the malware it detected? Does it have a recommended setting that you can rely on for the best course of action to take? Explore its capabilities and customize it to suit your internet surfing habits. Some antivirus allows you to schedule scans and updates so you do not slack off in your responsibilities. Bear in mind that updating your antivirus is crucial to its effectiveness. Without up-to-date virus and spyware definition files, you become at risk of miscalculating the status of your computer. It takes due attention and consistency to keep antimalware software proficient.

2. Your Vulnerable Side Revealed
             If you think unused software applications are harmless, you’ve already made yourself vulnerable to cyber criminals. Once you get infected by a strong malware and a hacker successfully enters you computer system, the first they target are your weak spots. Unused software is their usual safe haven whenever they attempting to gain complete administrative control over another’s computer. The less of these unused software you have, the less hidey-holes the hackers can use to assault you.

A second vulnerable side that may not be so obvious to many users is their activated file sharing options. This gives cyber criminals the perfect opportunity to exploit the information that your computer is uploading to the web. Go to the Control Panel now and switch off your file sharing option to guarantee the privacy of your virtual life.

 3.  Your Outdated Browser made Invalid
              What most computer users fail to realize is the fact that malware is an evolving set of codes. They take on new appearances and virtual signatures to guard themselves from getting detected the second they breach your defences. Don’t rely solely on your antivirus software to keep the threats out. An outdated browser is worse than fifty unused programs. Aside from its inability to preserve a smooth and comfortable internet surfing experience, it has too many loopholes that malware can squeeze themselves into. Check for the latest versions of the browser you are currently using and make the effort to sustain its high level of competency.

4. Your Ignorance Abandoned
             Even with all the security measures applied to your computer, your ignorance will continue to prick holes in your defence system for threats to enter through. It is vital to your overall safety that you know the dos and don’ts in using the internet. The latest forms of malware have adapted the appearance of antivirus software. They prompt you to download them for the sake of having the ultimate security against all kinds of cyber hazards. Little do you know that these software are the entryway for real malware to penetrate you. Spend time in reading about the efforts of software companies to battle cyber crimes and the most recent methods they prescribe users to employ.

User Account Control: Mother, may I?

             The User Account Control (UAC) feature in Windows is another way to help you control significant changes to your computer. If you want to make a change that requires administrator permission—like installing new software or changing Windows settings—UAC notifies you. If you're using an administrator account, you're prompted to confirm the change. Standard users are prompted to enter an administrator password before the change can be made. For more information, see What is User Account Control?

             UAC helps protect you from inadvertently making harmful changes, and can also keep other users from downloading unfamiliar software from the Internet willy-nilly or otherwise rendering your computer inoperable. You can adjust UAC to control how often you're notified about changes, especially if you're the only person using your computer, or if you'd rather not see frequent notifications.



Summary: 
             If you are the only holder of a computer or owner of a shared family PC - you might still want to set up your computer with user accounts, privilegies and other security rules and software. Doing so prevents unauthorized access to the Windows computer, makes it more stable and gives you joy sharing the home computer or surfing the Web online.

             Remember that even the most higher computer security can be broken due to certain factors that you’ve missed.
Help your acquaintances get better control of their computer’s security by sending them this article. Defeating ignorance is the first and most important step in possessing the safe virtual life you deserve.




0 comments:

Copyright © 2013 Youth Street and Blogger Templates - Anime OST.