Monday, December 26, 2011

How to secure your PC in 5 Easy Steps



Stay protected from being a victim of Identity theft. Be sure phishing and Vishing which steal your web identity and personal data without your knowledge. Here are some tips which can help you protect the information on your PC in one Go.
Use Secure URL
Secure your ways of visiting Banking websites, make sure you are using the right URL. Many popular sites allow HTTPS connections. Most of the phishing, Trojans, Vishing applications enter your system through emails. In Gmail, on the top-right hand corner there is a gear that says “Always use https://” ensures that you select the option. If you are a regular user of Facebook, on the top right corner under your name choose Account Settings, then click on Security on the left hand pane, then select Edit, go to the Secure Browsing section and tick the box that says “Browse Facebook on a secure connection (https) when possible” and click Save Changes to activate the feature.

Firefox has an extension called HTTPS Everywhere, for Firefox what it does is, it encrypts all the communications with popular websites who support encryption over HTTPS offering better security and protection
Encrypt important and sensitive files stored in your PC Hard drive
It could be your financial information, PINs, Passwords, or even personal photographs, they need to be encrypted to disarm any virus or Trojans, spam emails to hack into it. MAC OS and Windows both offer many encryption methods. Windows 7 has the Knowledge Base MAC OS  offers the Help and Hot to guides. 
But this is just primary encryption. There are other free utilities for encryption like TrueCrypt and McAfee encryption tools.

Use a 128 Bit or a 64 BIT WEP Key protection for your Wi-Fi Connection.
If you are using a Wi-Fi connection frequently, then set up a 128 Bit encryption and if possible use a VPN service like the Security KISS VPN service. Its free and its reliable. There are many other free VPN service providers and also the ones like Juniper and Cisco who offer the same with an E-token and an dedicated Switch which is ideal for small offices.

Avoid Data Snooping and Keystroke records with a Firewall and an Antivirus Software
Its all a fun game to many hackers and computer criminals. When you are using a regular browser, with hardly any encryption and security and doing your banking or checking your email, its  the most vulnerable state your PC is in and is open to a threat to record your activity and use it for fraudulent purposes.
Use a full version Antivirus application and frequently run the scan. From your Firewall check the threat report and keep all the software up-to-date.  Read about Windows 7 Microsoft Hot to protect site. They also offer Free  program called Security Essentials  that helps you to ensure real-time Malware and Spam Protection

Disable Images in e-mail
 You will get an email like this in your inbox “Your friend “so and so” has sent you a message. Click here what he has to say about” and when you click on that link or the image you are into a serious threat. The moment you click on it, your IP location is tracked and a small program gets executed in your system which you may not even notice. You are then drawn to register, while you do, your email contacts are all copied, all the data it could be uploaded are communicated to the hacker server/database. One such program is Zendio. This is called data/email snooping. 
Tweak your email settings, opt to view HTML Email from trusted senders and read plain text from others. Such settings are available with Gmail, Rediff, yahoo, Hotmail and almost all email providers including applications like HP Open View and Outlook.
In Gmail click the settings icon in the top-right hand corner chose Mail settings and select “Ask before displaying external content”
Careful on the e-mail Attachments that you download
Phishing is what takes place when you download without trusting the source of the email. Most of the email providers scan for virus, but they fail to scan for a threat. So first save the file in a folder which is not in C Drive (where your windows is installed) and then run a scan first. Apply this process usually for Documents and mandatorily for files that end with .exe extension.
Note that when you are logged in as an Administrator the threat is more open as you have the privilages to alter a system function or a process. It would be ideal if you kept yourself a non administrator login account for windows. 

No comments:

Post a Comment