Secure a Computer

Edited by Jeff Meyer, Lynn, Eng, estrella sacragon

A secure computer is the first step to protecting yourself from identity theft, crime, and other attacks on the Internet. This is especially true for mobile computers.

Instructions

Instructions 38341.jpg
  1. 1
    Make sure that you have to log in to your computer every time it starts
    .
    And use a strong password for that login.
    Was this step helpful? Yes | No| I need help
  2. 2
    Always lock your screen when you walk away from the computer.
    Was this step helpful? Yes | No| I need help
  3. 3
    Configure your screen saver to have a short time-out period, and enable the option to require password to resume.
    Was this step helpful? Yes | No| I need help
  4. 4
    At the very least, make sure that you have a software firewall, and up-to-date anti-virus software running at all times.
    Was this step helpful? Yes | No| I need help
  5. 5
    For added security, install anti-keylogging and sandbox software
    .
     
    1. Anti-keylogging software will scramble your keystrokes so that attackers will be unable to record your passwords or other sensitive typed information.
    2. A sandbox creates a small virtual area inside of your computer where you can run new programs in an isolated environment. This protects the rest of your computer from malicious software.
    Was this step helpful? Yes | No| I need help
  6. 6
    If your computer is capable, you can install virtualization software and try new programs there first
    .
    It's easy to revert a virtual machine back to a "good" state if there is a problem.
    Was this step helpful? Yes | No| I need help
  7. 7
    When mobile, only join wireless networks that you trust.
    Was this step helpful? Yes | No| I need help
  8. 8
    Added network security can be achieved by using VPN software
    .
    This will encrypt your traffic while over public networks.
    Was this step helpful? Yes | No| I need help

It is important that you secure your computer; otherwise, you may be endangering yourself, your family, friends and online contacts. If malicious software or a program infects your computer, there's a great possibility that it will stop working properly. In many instances, the spyware can corrupt or delete the files. It may likewise permit other people to access your computer and obtain confidential information.

The Remedy

  1. 1
    Update your security program
    .
    Having the most updated security software activated and installed will help in securing your internet connection. This program can help you understand and manage your emails, as well as other types of files that you download or receive. Needless to say, this will help in reducing the risks.
    Was this step helpful? Yes | No| I need help
  2. 2
    Data backup
    .
    Backing up all your important data can help you recover the information just in case a virus destroys your file, or your computer is damaged or stolen.
    Was this step helpful? Yes | No| I need help

Top Tips

  1. 1
    Install the security program and provide regular updates
    .
    You have to install and activate your anti-spyware and antivirus programs. It would also help to install a firewall.
    Was this step helpful? Yes | No| I need help
  2. 2
    Turn the updates on
    .
    This is important in order for your computer to receive the most recent fixes. Remember that new spyware and viruses are being created on a daily basis; hence it's essential that your program is updated so it can easily detect new threats.
    Was this step helpful? Yes | No| I need help
  3. 3
    Come up with a strong password
    .
    This is equally important for your confidential online accounts. It will help if you can modify your passwords regularly. You may keep a diary to ensure that you will remember your passwords.
    Was this step helpful? Yes | No| I need help
  4. 4
    Remain suspicious when it comes to receiving emails from individuals whom you don't even know
    .
    There are those who will be asking you to do something in exchange for cash, good health or even solutions to your present predicaments. The same is also true for web pages. Take note that anything that appears too good to be real usually is.
    Was this step helpful? Yes | No| I need help
  5. 5
    Think twice prior to clicking attachments or links that you receive through emails
    .
    A spam email often appears legitimate, but some people may use them to carry malicious software and virus programs.
    Was this step helpful? Yes | No| I need help
  6. 6
    Stop sharing any financial or personal information with your family members and friends
    .
    Any identity related information should not be disclosed, such as the following: Medicare number, birth date, driver's license and address. Don't disclose these details online or through email unless you know and trust the person on the other end.
    Was this step helpful? Yes | No| I need help
  7. 7
    Proper disposal of your computer
    .
    Prior to selling or disposing of your gadget, you have to remove every trace of personal data that is contained therein. It's important that you clean your hard drive. Use a special wiping program which can be purchased or downloaded online.
    Was this step helpful? Yes | No| I need help
  8. 8
    Gather the latest information regarding cyber security risks
    .
    You may subscribe to several email notification services which can keep you informed regarding the risks and possible solutions.
    Was this step helpful? Yes | No| I need help
  9. 9
    Know the right security programs for personal computers
    .
    For Windows 8, you may use Windows Defender, which is a full antivirus suite. On the other hand, you may utilize Microsoft security essentials for Windows 7 and Vista. Make sure that there's only one antivirus software that's installed in your computer.
    Was this step helpful? Yes | No| I need help
  10. 10
    Use identity finder
    .
    It's a must that you install an identity finder. This is a tool which can help you search, protect, and/or dispose of all personal information that has been stored or incorporated in your computer, file share or even external media.
    Was this step helpful? Yes | No| I need help

Tips & Tricks

  • Note: You can enhance the security of your computer by configuring a hard drive password in the computer's BIOS. Just remember that if you forget the password, the hard drive becomes unusable.

If you have problems with any of the steps in this article, please ask a question for more help, or post in the comments section below.

Comments

Article Info

Categories : Tech

Recent edits by: Eng, Lynn, Jeff Meyer

Share this Article:

Thanks to all authors for creating a page that has been read 1,169 times.

x

Thank Our Volunteer Authors.

Would you like to give back to the community by fixing a spelling mistake? Yes | No