11 tips for secure computing
We have become more dependent on smartphones, laptops and desktop computers for storing and sharing more information than ever before. Any disruption caused by spywares, viruses, Trojans, identity theft, hardware and application malfunctions, has a huge impact on our lives. No matter how technology savvy the user, secure computing practices are a combination of physical protection, use of original software, good security settings including the secure actions of the user.
Below are 11 tips that will help you protect your smartphones, laptops and desktop computers and ultimately the information stored on them:
1. Keep your computer updated
There are new software viruses emerging every day and it is essential to use anti-virus software and keep it up-to-date. Most anti-virus software provides the user the ability to do an automatic update.
The operating system software should be updated automatically or manually as and when available. It is also important to keep other application software updated. Operating and application software updates often include essential bug fixes and security features that address existing vulnerabilities.
Finally, the personal firewall should be enabled on your laptops and desktop computers. This will help keep unauthorised people from snooping around your computer when it is connected to the Internet.
2. Download files legally
Downloading music and movies from peer-to-peer networks can be dangerous and harmful to your smartphones, laptop and desktop computers. These downloaded files are sometimes riddled with viruses, spyware and Trojans. Further, there is possibility of legal penalties as well as penalties for piracy.
3. Create strong, secure passwords
Passwords should contain at least eight characters with a combination of letters, numbers and symbols. Strong passwords are less likely to be hacked than very generic, dictionary passwords.
Use of strong, pass-phrases also helps to avoid having to write down a password.
Never share your passwords or pass-phrases with anyone.
4. Keep personal information safe
Never share your personal information via email, no matter how official the email looks. Official business matters that require personal information should be sent via a secure email network.
5. Limit information on social media sites
Protect yourself from identity theft and other scams by limiting what information you post or disclose on-line. You should also limit who can see any information such as birth dates, anniversaries, addresses, phone numbers and photos disclosed or posted online.
6. Scan email attachments and validate links
The attachments sent to you should be scanned in an effort to keep malware off your smartphones, laptops and desktop computers. Viruses can spread through emails from friends, family and unknown persons.
If you receive a link in an email from anyone, hover your mouse over the link and look in the bottom bar of your web browser to reveal the URL and validate that the link is legitimate. This will ensure that you know where you are going on the Internet, and whether or not you want to go there.
7. Scan all external devices such as USB drives connected to your laptop and desktop computers
All external devices connected to the laptop and desktop computers should be scanned periodically in an effort to keep malware out. Viruses can also spread through external devices used on other laptops and desktops.
8. Lock your smartphones, laptops and desktops computers
Physically lock smartphones, laptops and desktops computers when leaving them unattended, to prevent theft.
The users should lock screens with a password to safeguard data and prevent unauthorised access.
9. Log off in public areas
Always log-off after using a public computer or network. Users should be especially mindful to uncheck boxes that will remember users’ login information when logging into online services, such as email and bank accounts. If possible avoid using public computers or networks.
10. Back up important information
All important information should be backed up to another computer or device. The backed up information should be stored securely, ideally at another location.
11. Avoid surfing websites that you do not already know
Adware and spyware exploit Internet Browsers. So try and stick with the websites you trust.
While these steps are not foolproof, they will go a long way towards extending the life of your machine and protecting the valuable information contained on it.
About the writer :
Sujit Christy is a Governance, Risk and Compliance professional and Director at Layers-7 Seguro Consultoria (Pvt) Ltd. He is the founding member and President of the (ISC)2 Chennai Chapter, Founder/President of Information Security Professional Associates (iSPA) and a board member of the (ISC)2 Colombo Chapter.
He can be emailed at sujit@layers-7.com.