Here are some basic tips of computer security for your system, your sensitive information and your details are kept free of infection . From the obvious, to the most complex, recommendations on how to protect ourselves, as more warlike as the internet are very useful. If you practice, the chances of infection will drop considerably.
While these basic computer security tips are aimed at less experienced Windows user and public -for the system to be used by most new computer users and the most affected by viruses and threats-, the rules can be transferred to other operating systems and each computer we want to conduct operations without compromising our data and system. That said, let’s see what you’re doing wrong for your safety and how you can fix it.
1- Beware of attachments in your mail
If you do not know, do not open it. With that line of logic, you should stay safe long emails from strange directions or have attachments to .pps, .zip, .exe, etc. As much as you are not having a good time, and the invitation to take charge of miracle pills look tempting … Is it worth the risk? Even when a mail attachment that you were not expecting it sends an acquaintance, it is best to ask if by any means he has sent to be a little safer. A software level, what you can do is email scanning by your antivirus or antimalware favorite application. Distrust, short of paranoia is a good tool to avoid falling under the yoke of threats.
2- Upgrade the software on your system periodically
Newer, tougher. This should be a truth perogrullo, it is as simple as thinking “if I use an application that is outdated three months ago, I took three months vulnerabilities unresolved up”, which will make you more likely to get malware system. Reluctance to update software (including operating system) is due to costs, laziness and mainly to oblivion. So it is good to have some applications that check for updates for the software you have installed and recommend us download. Update software does not mean that the new version can not come other holes, but is less common than the previous case. And in the case of operating systems, Windows XP case 7 is illustrative and by others.
3- Create better passwords and change them every six months
More difficult, less predictability. First and forced place is in your text field: “Enter new password”. It must appeal to the same password for years for all services to which you are subscribed is actually a risk, because if you find one; discover all. So it is best to create passwords for service or service by gender, in addition to a password manager, forget “remember password” in public places and use application to create encrypted keys that neither the MIT nerd could guess without took him all his life.
4- Use antivirus and anti-malware applications
We do not want heroes: Antivirus uses. The virus can cost you money or not but agree which uses system resources you could give some headache. But weighing the risks, an active antivirus is always more effective and safer than a computer without it. For in the latter case the system depends heavily on your care, and if I ever fail, forget, or someone uses your system goodbye. There antivirus everywhere and offer different cost and performance according as RAM usage. Choose the one that suits you. Same with the anti-malware, Spybot Search and Destroy and MalwareBytes applications are the dynamic duo that comes to the rescue at the sign in the sky that has been three days since the last scan.
5- He usually close the session at the end
An input window is an egress window. Humans are curious by nature, and when he sees something that is not yours made available, it is likely that, at least out of curiosity, make use of the gift of becoming. This usually happens in internet cafes, offices and work everywhere where computers are shared. If you open Facebook, Gmail or any other service, get used to log off before getting up from his chair to leave. This will avoid entering the huge rate of users who lose their data leave open sessions there. A good exercise to build the habit is to do at home too, whenever you get up from the computer; logs.
6- Avoid private operations in open, public networks
Share the connection, but not the data. One of the most difficult issues for many tourists is found on vacation and having to perform banking transactions from the open network from your hotel or from some place open networks. This means comfort, but also possibilities for the shape and sniffing copper assault us, social, bank accounts, email, etc. in the blink of an eye. To avoid this you should avoid connecting, and that’s like saying that cuts the light in your home so you never electrocutes you. Therefore, it is best to use alternative means or as VPN servers, more accessible, extensions like Blacksheep, access only HTTPS sites and have the firewall at full attention.
7- Enable Firewall on your system
The Great Wall of China was not built for decoration. This sentence should be an invitation we care more without putting so many quirks when it comes to be a little curtailed at our convenience. A Firewall can be configured entirely to the annoyance of their presence will prove comforting protection level, you can change the priority system, add exceptions, and if you’re on Windows, use alternative applications that give you even more possibilities.
8- Avoid software partnerships with recurrent conditions
CanciónMuyLinda.exe is no MP3: Due to the number of scams that exist in relation to web services and applications so they can think, have a clear idea of what programs do not contribute to your computer a virus and shelter malware is a complex both. We therefore propose a return to the classics and their alternatives. But you can not ignore innovation, it is good to have a reference website that will wipe doubts about the legitimacy of software, because while many programs promise to remove malware, they themselves are reported as infections, also pollute your system to sell the solution.
9. Disconnect from the Internet when you do not need
Lower exposure, lower infection rate: Exceptions in droves, but the largest number of infections occur when computers are connected to the network, because spyware and malware make their actions by communicating with servers or sending information using open ports your connection. So if you want to lower the rate of possible infection and using the computer too long without a connection to the network (games, design, writing, etc) or if you’re going to sleep or directly going to be absent disconnecting internet you avoid something happening to your system without shutting down. Simple but 100% effective.
Better safe than sorry: For be a situation where you lose data due to lack of security policies on your computer, not to accomplish anything of all that we have counted up, the most common situation is desperate. But be important backups or backups, when everyone would being flooded in tears, who did the work and supported their data will take it as a experience. No VPN, antivirus, paranoia I beat up the security provided by the existence of the data to another disk or cloud services. As for software, we made a recommendation to 6 applications to backup your data, choose the one you like and feel relaxed making a backup every certain period of time. You can also backup your email or other social services.
Bonus: Educate those who share the computer with you
The more they know, the less they are wrong: This site is intended to make clear that although can be a paranoid computer security when you have this in your hands an inexperienced, few of your resources fulfill their function and the computer have a good chance of becoming infected. To avoid this, especially for those who have a family computer or share in their work, it is best to educate those who have contact with computers in general. Both sharing yours and your environment. Teaching this article, telling your own experience, recommending security software and instructing them in the art of being aware of the danger that exists every time we connect the network cable to the computer.
Caring for our systems is a requirement that users have to take when the creators of the software or operating system errors have been made, so that ultimately the security depends on us.