Protect Yourself From Stranger Danger
Ten Steps To Internet Security
To Protect Yourself
- Get educated in security, Google for “free internet security courses”, they are offered by several universities such as MIT, Berkeley and other organizations.
- Before you purchase software online, research and then use a reputable source.
- Be careful downloading free software it may have a caveat, know your source.
- If you do not need an unknown attachment, don't open it.
- Stay current with security patches for your computer system.
- Be armed with a firewall and a good anti-virus program.
- Setup your anti-virus to auto scan all e-mail attachments you receive.
- Clear your browser of internet cookies when you are finished for the day.
- Do not use public Wi-Fi for financial transactions.
- Tell others when you are sending an attachment so they do not delete it to protect their computer.
Some Of The Problems You May Avoid
- Virus: This is a program that can copy itself and infect others through executable code. It is transferred from computer to computer through network connections or on a removable medium such as a floppy disk, CD, DVD, or USB drive.
- Worm: A worm is a self-replicating program and uses a network to send copies of itself to other computers on the network usually without any user intervention. Unlike a virus, it does not need to attach itself to an existing program or media.
- Trojan Horse: The Trojan Horse, describes a class of computer threats. The software appears to perform a desirable function but in fact performs undisclosed malicious functions. Trojan Horses can be easily and unwittingly downloaded. Free software and games are the worst offenders. The term is derived from the classical story of the Trojan Horse.
- Spyware: Software that is intended to collect information about a users browsing habits, location and even passwords.
- Adware: Is advertising-supported software and automatically plays, displays, or downloads advertisements to a computer after you make a connection to a site. Some types are also spyware.
- Crimeware: Used for identity theft, it accesses a computer user's online accounts at financial service companies usually on their servers but it may reside on your system.
- Malware: Malware is software designed to break into your computer and either damage it, steal information, or perhaps just annoy you!
©2009 mfchase & Associates
As an adult we don’t think "Stranger Danger" especially when using a computer. We should, there are many dangers lurking in the web. In our world today we need to be able to surf, bank and shop online without interruption. So what are some of the dangers and what can you do to protect yourself? Below the Ten Steps To Internet Security is a list of the most common "Stranger Dangers" we face. To be sure, there is no sure fire way to avoid all the problems but you can significantly reduce your risk!
To contact me with questions or comments write to:
Get your FREE copy of First Monday NewsLetter
Sign up NOW!
Powered by MailChimp?