No longer are viruses the only threat on the internet. In recent years other threats have evolved which include spyware, adware, hacking, identity theft, information theft, pop-ups and the loss of information.
Let's begin with the basics. We all need to protect our PC in the same way we protect our home, car and bank account. We wouldn't give a stranger the keys to our car, home or bank account now would we. If you don't protect your PC it is like giving the keys to a stranger and letting him/her have full access to your PC. Once the stranger has the keys they can snoop around and take whatever they want. I know, your thinking how can they do this, my computer is in my house and my doors are locked. Well, today you can be anywhere in the world and access someone's computer via the internet. Since the introduction of cable modems and DSL everyone's PC is online all the time and accessible.
Why do I need to protect my PC, I don't keep any important information on it? Ask yourself a couple of questions.
1. Do I bank online?
2. Do I shop online?
3. Do I create documents, spreadsheets?
4. Do I let other people use my PC?
5. Do I download music, files onto my PC?
If you answered yes to any of these questions then your PC is vulnerable. If you bank online then you are sending personal confidential information to your bank via the Internet. For Example: Let's say you are infected with spyware and you are typing in your account number plus password. A spyware installation can record key strokes and then send them off to a site on the internet. Now the person who setup the site has your account number and password to your bank. Here is one more example, if you answered yes to I let other people use my pc, here is what happens. The other person decides that they like this new cool piece of software. They download and double click on the exe, msi or whatever installs the software. The adware, spyware or virus installs. Now the infection is installed and now it can start stealing confidential information or cause havoc on your PC. You get onto the PC as always, since you don't know this has happened and start doing what you always do, type documents, go to chat rooms, do your banking online, reconcile your banking with quicken and all this time your confidential information is stolen and you are completely unaware that this occurred.
The million dollar question, what do I do? Well, you can follow this approach.
1. Install a Spyware application and install and configure correctly. If you already have spyware application installed make sure it is up to date and make sure that is configured properly.
2. Install an Adware application and install and configure properly. If you already have adware application installed make sure it is up to date and make sure that is configured properly.
3. Install an AntiVirus application and install and configure properly. If you already have antivirus application installed make sure it is up to date and make sure that is configured properly.
4. Install backup software, why because if something does get through your defenses or delete something by accident you always have a way of retrieving the information. You should try to backup your system at least every other day.
5. Install Encryption software. This software will encrypt files like word docs, spreadsheets, banking file on quicken. This way if someone does steal your information they will not be able to read it.
6. Install a Firewall. The Firewall can either be software or hardware based. I would install both especially if you bring your laptop with you and connect to the internet at different locations. The Firewall will block hackers trying to scan your system while you are on the Internet.
Many people have these applications installed but they do not configure them correctly. Just installing the application does not mean that the application is working properly to stop the threat/infection. On some applications you need to configure the setting to make the application work the way it was designed to. Find out how to configure and install the software properly either by reading a how to book or getting someone to help. If you already have the application installed make sure it is up to date and make sure that is configured properly. All of the software needs to be up to date and kept current. As new threats are release on the internet, all applications will need the current updates to fight these threats.
If you would like to find out if you're PC is protected you can take the test. This will not harm your PC it just checks for vulnerabilities and lets you know if you passed or failed. The application is a single exe and DOES NOT NEED TO BE INSTALLED. All you need to do is run the test application and follow the instructions. Get Risk Assessment Tool
All articles are written by HowtoPCGuru! HowtoPCGuru http://www.howtopcguru.com You may reproduce and use this article just so long as you add a link (http://www.howtopcguru.com) down at the bottom. HowtoPCGuru, All the latest articles, tools, news, file hosting and more!
Nobody wants to pay to remove spyware. At the very... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
Let us take the example of scrambling an egg. First,... Read More
With the Internet entering our lives in such an explosive... Read More
Have you ever got an email asking you to confirm... Read More
To blog or not to blog? Well, why not? Lots... Read More
I am the victim of an internet scam. It is... Read More
Everyone should eliminate spyware and adware from your hard drive... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
Spyware is software that runs on a personal computer without... Read More
Fishing on the Internet has come a long way. However,... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
There are folks out there who use their powers for... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
The money being spent online is steadily growing. With billions... Read More
Recently I have received email from my bank/credit Card Company,... Read More
This is the second in a series of articles highlighting... Read More
If you are a parent, as am I, I think... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
There is nothing more important that password security in world... Read More
You and I are a lot alike. We are both... Read More
My first experience with a spyware BHO based infection was... Read More
In the past I've never really paid much attention to... Read More
File sharing on p2p is soaring despite the music and... Read More
I Challenge You To Crack The Code ------------------------------------- I had... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
The Threat10 years ago you could probably have run no... Read More
Today the internet is a mine field of malicious code... Read More
Today,on most internet user's computers, we have the ability to... Read More
If you have used a Windows machine for a while,... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
Phishing is the act of some individual sending an email... Read More
Afraid that someone is monitoring your PC or installed a... Read More
Phishing is a relatively new form of online fraud that... Read More
Internet scams and frauds are on the rise! The quantity... Read More
Let us take the example of scrambling an egg. First,... Read More
Spyware is the most troublesome software to appear on the... Read More
"You've just won a fabulous vacation or prize package! Now,... Read More
A crowded marketplace can lead to unethical webmasters using underhand... Read More
There is nothing more important that password security in world... Read More
With the Internet entering our lives in such an explosive... Read More
Pharming is one of the latest online scams and rapidly... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
Someone recently told me, "You would have to be a... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
Can you protect your computer from all possible viruses and... Read More
Do you sometimes notice your computer running slower. Is your... Read More
This is the second in a series of articles highlighting... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
So called phishers try to catch the information about the... Read More
The average computer is packed with hidden software that can... Read More
If you are wondering how to fight spyware for safe... Read More
The Internet offers a global marketplace for consumers and businesses.... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
Over the past few years as the internet has become... Read More
IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
When it comes to a secure website and passwords it... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
The first thing people think about when defending their computers... Read More
Ok, ok, I know you've seen them. All those pop... Read More
Internet Security |