Cyber Security Building a Good HabitBy doing this you can have a better chance of keeping your confidential information protected from attacks from virus or similar applications or from hackers. This way you can keep your personal information safe from other persons who would like to access them and use them for personal gain or protect them from applications that can erase or corrupt your files. Part of building a good habit would be to identify how your information can be accessed and who would be the most likely people who can gain from accessing your confidential files. It’s like identifying the usual suspects in a criminal line-up. I’m not saying that the people you know cannot be trusted but it helps to be extra cautious. You brother might not do something untrustworthy by his friends might and if they have physical access to your computer then your files are at a risk of being hacked. Lock your computer with a good password. Use combinations of letters and numbers, upper case and lower case, and even use codes. Avoid using the usual birthdays, social security numbers, bank PINs, account numbers, favorite superheroes, favorite food, etc. Use unique passwords and make one up for every system that requires authentication. Do not use the same password in all your confidential files. To protect your computer from outside hackers, the best thing would be to disconnect your computer from the network when you’re not using it. No anti-virus application or firewall systems provide 100 per cent protection. The best way would be to remove yourself from the network when you’re not using your computer to reduce the risk of being attacked. When you do go online, make sure that you have your firewall on and your anti-virus application active. Also look into your security settings. Your emails, web browsers and even other applications have specific settings which increase the security allowing them to block attacks from virus, malware and spyware. Study the security settings and select one which permits you to maximize the use of the application but at the same time offer you a good deal of security to keep your files protected. Also, do not forget about power surges and other technological problems. Even though, the virus and hacker threats are real and sometimes the priority, people also forget that sometimes power surges or breakdown of computer hardware can cause loss of data or have files corrupted and rendered unusable. To have added protection therefore, it would be wise to install some uninterrupted power supply that protects your from power surges and allows you to back up or shut down your computer properly preventing possible corruption of files and applications. And speaking of backing up, it would be great if you would regularly back up your files just in case the unthinkable happens. May these be personal files or files you need for work, having a good back up is always a good thing to have. You see, once you have a system you will develop a good habit in cyber security which can help reduce the risks of losing files or your confidential information being hacked. Comments |
MenuMy ArticlesFurther Equipping Cybersecurity ProfessionalsFamily Cyber Security Cyber Security Threats Cyber Security For Kids Cyber Security And Online Shopping What Is Cybersecurity? Cyber Security Tips For Your Protection Cyber Security Simple Boosts To Cyber Security Know The Truth, Exposing Myths In Cyber Security Your Browser – Cyber Security’s 1st Line Of Defense The Future Of Cyber Security Jobs Facing Computer And Cyber Security Threats US Intensifies Cybersecurity Initiative What Is Cyber Security All About? Why Do We Need Cyber Security? Cyber Security Building A Good Habit Unsecured: Cyber Security And Your Data Simple Cybersecurity Measures For Individuals More Governments Acquire Awareness In Cybersecurity Challenges Cyber Security Regulations Cyber Security Tips Cyber Security Training: Tips And Guides Cyber Security: Password Protected |
||||||||
|
© 2024 Cyber Security - Site Map - Privacy Policy - For Knowledge Base Return To AccessInfoHub.com