Get FREE Instant Access
To your online Video Fighting Course.
Click Here For FREE Instant Access.

Self Defense for Your Home Computer by Derek Smith

In this article, I will provide you with 12 tips on how you can deal with security threats.

The internet is filled with many threats. For many of you, I probably don’t have to tell you the types of problems you can run into when it comes to computer and internet threats because you have already experienced many of them. Most of you have heard about internet threats, and perhaps due to a lack of education about computer security, do not take any precautions to protect your computers and other devices when working on the internet.

The web, as it is known today, is used to collect, store, and distribute information for commerce, for entertainment, and many other activities. There are also many companies, organizations, and individuals that either conduct business over or exist because of the internet. Hence, the inherent need to employ measures to deal with internet security threats that face both the companies and individuals daily when using the net.

Let’s explore the kind of threats and measures to take when on the internet.

The most important facets of security are based on the collection of your personal data and other sensitive data. Also important are the business transactions common with many online businesses. Businesses have a duty to protect your information by investing in security measures to guarantees some degree of security. They must have protocols in place to govern the handling and security of your sensitive data.

In this article, I will talk a little about the deployment of measures such as the encryption and just to give you a little understanding of what you can do to protect yourself. Remember, Fight Fast is all about every aspect of your protection. I plan to tackle the significant aspects of security, including malware and virus detection and the deployment of firewalls.

As time passes and computers become more sophisticated, so does the security threats. Hackers and their skills continue to evolve and present even greater challenges for you and the companies you conduct business with. This increase in hacker sophistication causes a need for greater attention from you.

Computer security professionals spend most of their time being reactive to hacker threats instead of proactive, and they often find themselves baffled by the increasing severity and complexity the malware has exhibited. These threats are very sophisticated and their capabilities are phenomenal in the manner in which they steal and damage data.

Since it is almost impossible to prevent attacks, your goal should be to minimize the impact of cyberattacks. Here are 12 things you should definitely do to protect your home computer and devices from attack.

1. Use a firewall.

A firewall is software designed to create a barrier between your information and the outside world. Firewalls prevent unauthorized access to your home computer and alert you of any intrusion attempts.

The first thing to do with your new computer (or the computer have now) is to make sure the firewall is enabled before you go online. You can also purchase a hardware firewall from companies like Cisco, Sonic, and Norton.

2. Install antivirus software.

Computer viruses, keyloggers, and Trojans are everywhere. Antivirus programs like Norton and McFee immunize your computer against unauthorized code or software that threatens your operating system. Viruses have various effects that may be easy to spot: For example, they might slow your computer to a halt or delete critical files.

Antivirus software plays a significant role in protecting your system by detecting real-time threats to ensure your data is safe. Some advanced antivirus programs provide automatic updates, protecting your machine from the new viruses that generate every day. After you install an antivirus program, don’t forget to use it. Run or schedule regular virus scans to keep your computer virus-free.

3. Install an anti-spyware package.

Spyware is a special kind of software that secretly monitors and collects personal or organizational information. It is designed to be hard to detect and difficult to remove and tends to serve up unwanted ads or search results to direct you to specific websites.

Even more disturbing is the fact that some spyware records every keystroke you make in order to gain access to your passwords and other financial information. Anti-spyware concentrates exclusively on this problem and is often included in major antivirus packages like Webroot, McAfee, and Norton. By using anti-spyware software, you will have real-time protection on your home computer.

4. Use complex passwords.

Using secure passwords is the most essential way to prevent illegal intrusions onto your home computer. The more secure your passwords, the harder it is for a hacker to invade your system.

Simply put, more secure often means longer and more complex: Use a password that has at least eight characters and a combination of numbers, upper- and lowercase letters, and computer symbols. While 8 is OK, using 12 or more characters increases your protection exponentially. Hackers have an arsenal of tools to break short, easy passwords in minutes.

Also, I recommend that you don’t use recognizable words or combinations that represent birthdays or other information that can be connected to you. Don’t reuse passwords either; if you have too many passwords to remember, consider using a password manager Password Boss to store and protect your passwords.

5. Keep your OS, apps, and browser up to date.

Always install new updates to your operating systems. Most updates include security fixes that prevent hackers from accessing and exploiting your data.

The same goes for your favorite apps. Today’s web browsers are increasingly sophisticated, especially in privacy and security. Be sure to review your browser security settings in addition to installing all new updates. For example, you can use your browser to prevent websites from tracking your movements, which increases your online privacy.

6. Ignore spam.

Never open email messages that you are not expecting or don’t recognize who they came from. Also, never click on links or open attachments that are inside these unsolicited emails. Spamming eliminating software has become pretty good at catching the most egregious spam. But phishing emails that pretend to be from your friends, associates, and trusted businesses like your bank have increased, so stay on the lookout for anything that looks or sounds phishy.

7. Back up your computer.

If you are not already backing up your hard drive, then you need to start doing so now. Backing up your information is critical in case disaster strikes, and hackers do get through and trash your system.

Always be sure you have a backup you can use to rebuild after suffering a data breach or loss. Backup utilities built into the Mac (Time Machine) and Windows (File History) are good places to start. You can also buy an external backup hard drive as I do.

8. Shut it down.

Many of you, and I am guilty as well, never turn off your computer. It is actually best that you turn off your machine overnight or during extended periods when you’re not using it. Always being on makes your computer a more visible and available target for hackers. Shutting down breaks the connection a hacker may have established with your computer.

9. Use virtualization.

Some of you probably have no idea what this is, but if you visit sketchy websites, expect to be bombarded with Spyware and viruses. While the best way to avoid browser-derived intrusions is to steer clear of unsafe sites, virtualization allows you to run your browser in a virtual environment that sidesteps your operating system to keep it safer. If your virtual machine is compromised, you can simply get rid of it and start again.

10. Secure your network.

If you’ve got a new router, chances are it comes with no set security. Most people don’t even realize they can do this, but you should always log into your router and set a password using a secure, encrypted setup. This prevents intruders from infiltrating your network, and messing with your settings, getting access to your computer.

How To Pick Locks. (Who Needs Keys?)

You may find this shocking, but picking open a standard "tumbler" lock, (like the one on your front door), is pretty damn easy when you know how it's done.

And in a "meltdown" survival situation, (once the smash-n-grab crowd has stolen everything not tied-down), the food and water and secure shelter will all be behind locked doors, (which explains why Special Forces are often trained in lock picking... and why they carry a set of lock pics with them).

It's a lot of fun learning this skill, (it doesn't take long)... and kinda nice to help out that buddy locked out of his house after the wife discovered what really happened on that "no money down" real estate seminar in Vegas.

>> Check Out "Lock Picking Kit" Here. <<

11. Use two-factor authentication.

Passwords are the first line of defense against computer hackers, but a second layer increases your protection. Major online companies like Facebook, Google, Apple, and Microsoft let you enable two-factor authentication, which requires you to type in a numerical code in addition to your password when logging in. This hardens your computer when using it online.

12. Use encryption.

I saved this one for last because I think this is the number one thing you can do to increase your security. Even if someone can steal your data or monitor your internet connection, encryption can prevent hackers from accessing any of that information. You can encrypt your Windows or macOS hard drive with software like BitLocker or FileVault, encrypt any USB flash drive that contains sensitive information, and use a VPN to encrypt your web traffic. Also, when shopping, only shop at encrypted websites – you can spot them immediately by the “https” in the address bar accompanied by a closed padlock icon.

Bottom line

The bottom line is that as long as there is an internet, there will be hackers trying to steal your information. It is your responsibility to take precautions to lock down and harden your computer systems. A combination of hardware and software defenses, as well as best computing practices, will remain the best barrier between you and online predators. Hopefully, this article will give you some actionable measures you can take or at least pique your interest to learn more.

Click here for more tips and tricks to making your home more secure.

Leave A Reply:

Leave a Reply

Your email address will not be published. Required fields are marked *