Computer Security Tips

A firewall provides a barrier against hacking and other unauthorized access, while still allowing desired communication to pass through.

 

When choosing a firewall, some features to look for include ease-of-use, flexible configurations, monitoring features, and product support.

 

Antivirus software blocks viruses, and detects and removes existing viruses that are on your computer.   

 

When choosing an antivirus tool, some features to consider include the frequency of virus definition updates, the amount of system resources used by the software, and the availability and cost of product support.

 

Many malicious applications exploit known security holes in operating systems and browsers. Install the latest security patches for your operating system and browser.

 

Software vendors often also provide security patches for their products. Regularly check with the manufacturers of your software to see if security patches are available.

 

Create passwords that are difficult for others to guess or to decode using cracking tools.

– Use 8 or more characters.

– Mix letters (uppercase and lowercase), numbers, and symbols.

– Avoid sequences of numbers or repeated characters.

– Use different passwords for every program and Web site.

– Change passwords regularly.

 

Safeguard your passwords.

– Do not reveal your passwords to anyone.

– Do not respond to an e-mail message that requests your password or requests verification of your password. Responsible companies don't use e-mail to ask customers for this information.

– On public computers that you don't control, such as in Internet cafes and airport lounges, do not access information that requires a password.

 

Only download programs from trusted Web sites, or refer to a trusted source for information prior to downloading. Do not install software if you are unsure about it.

 

Some free programs (such as screen savers, games, customized toolbars, and peer-to-peer file sharing software) are often bundled with spyware and adware. Be sure you understand all of the software packaged with an application.

 

Prior to installation, read any disclosures, such as a license agreement or privacy statement. Sometimes indication of the inclusion of unwanted software is concealed in the fine print of these documents.

 

Have a backup of your drives available, before disaster strikes. Establish a schedule for regular backups and keep them in a safe place.