As we do these things on a more regular basis, we open ourselves up to potential hackers, attackers and crackers. While some may be looking to phish your personal information and identity for resale, others simply just want to use your computer as a platform from which to attack other unknowing targets.
Below are a few easy, cost-effective steps you can take to protect your computer system and make your computer more secure to begin with:
How to Protect Your Computer System
1. Always make backups of important information and store in a safe place separate from your computer.
2. Update and patch your operating system, web browser and software frequently. If you have a Windows operating system, go to Windows Update in settings and update your windows. Similarly, you can upgrade your Web Browsers and other Software. Many software gives you notifications about the new version. So, make sure to upgrade the software whenever you see the notification to upgrade.
3. Install a firewall. Without a good firewall, viruses, worms, Trojans, malware and adware can all easily access your computer from the Internet. Consideration should be given to the benefits and differences between hardware and software based firewall programs.
5. Install anti-virus software and set for automatic updates so that you receive the most current versions.
6. Do not open unknown email attachments. It is simply not enough that you may recognize the address from which it originates because many viruses can spread from a familiar address.
7. Do not run programs from unknown origins. Also, do not send these types of programs to friends and coworkers because they contain funny or amusing stories or jokes. They may contain a Trojans horse waiting to infect a computer.
8. Disable hidden filename extensions. By default, the Windows operating system is set to “hide file extensions for known file types”. Disable this option so that file extensions display in Windows. Some file extensions will, by default, continue to remain hidden, but you are more likely to see any unusual file extensions that do not belong.
9. Turn off your computer and disconnect from the network when not using the computer. A hacker cannot attack your computer when you are disconnected from the network or the computer is off.
10. Consider making a boot disk on a floppy disk or restore points in case your computer is damaged or compromised by a malicious program. Obviously, you need to take this step before you experience a hostile breach of your system.
So, These are the Top 10 tips to protect your computer system. I hope this article helps you to understand the security concerns of your computer. To sum up, I would say safety lies in your own hands. Its better to be safe than to be sorry later on. I hope you will follow all these steps to protect your computer system.
Please do share this article with your friends and families and also follow us on social media to get more articles like this. If you have any questions or thoughts, please share in the comments section below.