Long past are the days when hackers were only adventurist IT students checking out their talents naughtily and freely. Today, malicious software and pathogen writers are in it for the cash and make that as their livelihood. They hijack computers to send spam, pilfer identities and finances online.
With many of us now heavily dependent upon our computers and the web It is now more important than ever to protect your system, files and personal info against malicious software and viruses.
Update Your System
Enable automatic updates if you're using Windows. Many viruses spread by using failings on the O. S so that regular installation of updates is a must. Enable and install updates frequently, particularly for applications which you use frequently such as your internet browser and office suite.
Check Before You Download
Download files just from sites which you know to be safe. Supposed "warez" sites which offer free or pirated copies of applications are widely known for spreading spyware and other nasties.
Be Wary of Attachments
Do not open or better yet , remove outright unexpected attachments, many malwares spread through e-mail attachments and countless firms and individuals are caught out by this classic trick on a daily basis.
Use a Router
A good router also acts as a firewall to add a shielding layer between your personal computer or network and the web by dropping unrequested connections. Many worms which may initiate unwanted connections can be blocked by a firewalled router.
Backup Your Info
Seems obvious but so many folk and companies depend on the sole drive in their machine. Data can be lost when these hard drives fail, not only due to viruses but also due to general wear-and-tear, natural tragedies and frequent power outages so always have a backup on disc, tape or another system.
Install and Update Antivirus Software
You are asking for trouble if you do not have this. Some of the free ones could even be better than the commercial ones. And ensure your anti virus program is ready to immediately update in order that it can stay before the new viruses. McAfee, AVG and Eset among others all provide a thorough (and occasionally free) anti virus software which is perfectly adequate for most home and business users.
Only Install Trusted Software
Microsoft and Adobe are the typically recognised trusted sources of software. Other comparatively unknown names could be malicious software sites. Also, do not install software which you have no plan of using in any way.
Beware of Unknown Emails
Some sites pose as finance institutions and may ask you to verify your identity but in truth are only out to get your private identification details and passwords.
Avoid Clicking on Adverts
Some pretend to be adverts but are really malware.
Be Cautious What You Stick to Your Personal Computer
An infected USB flash drive is a standard agent in propagating viruses (many company networks precisely forbid the utilization of USB memory sticks for this very reason). If it isn't your USB, exercise caution before just sticking it into your personal computer. Has it come fro a reliable source? Did you know what to expect to find on it?
Make a Complex Password for Login
A hacker will find it more difficult to attack your computer if you have a complex password. A complex password is one which has letters, numbers, symbols, lower and upper cases. All too commonly we see folk using either their name, their kids or pets names or part of their address as their passwords which is just begging for trouble.
Defending your PC from spyware and viruses by utilizing a combination, or maybe all, of the above gives you the best possible chance of keeping your files and documents safe. Data recovery Specialists can, and do, rescue files and information from even the worst infected systems, but many of those cases could so simply have been avoided in the 1st place.
About the Author:
Jason Sloan runs a data recovery business called Kingdom Data Recovery Edinburgh who service all of the United Kingdom. He has many articles on his web site which refer to issues with storage devices and useful data about stopping information loss.
0 comments:
Post a Comment