Keeping clients' computers safe and profitable for over 30 years | |||
Home Forms About Current Newsletter subscribe Search All Articles
Browse by Category
|
Layered Security 2010Thoughtful UserThere really is no substitute for a user with a functioning brain. People need to pay attention and be aware of unsafe behavior. I received a call a few days ago from my credit card company telling me that there was a fraud alert on my credit card and I needed to call them right away. They left a phone number. Of course, I didn't call that number. I had no way of knowing if it was legitimate. I pulled my credit card statement and called the number on that statement. I wasn't going to call and verify my identity to whoever left a phone number on my voicemail. The fraud alert phone call was legitimate, but mistaken. There was an odd, but legitimate charge.In any case, just as you shouldn't give your credit card information to someone who calls and requests it, so also you shouldn't click on e-mail links that you can't verify. You should be suspicious of e-mails and phone calls. You should never be sharing files (movies or TV shows, or music) with other people you don't know using something like Limewire. The fact that the email was apparently sent by someone you know is not verification that it was sent by them, or that it is not otherwise infected. You need to avoid potentially dangerous sites, because you can get infected by merely viewing a site, without actually downloading or clicking on anything. RouterA simple physical router will block all unrequested incoming requests, thus stopping most potential attacks. You should have one in every home or office. Larger offices that can afford it and need to protect important information and many users, should purchase a full firewall like SonicWall and have it professionally installed. These will include monitoring traffic and blocking suspicious incoming traffic at the router, before it gets to your machine. They will also block suspicious outgoing traffic.Browser ProtectionI recommend using Firefox for your browsing instead of Internet Exposer. It is safer. In addition, there are extensions which will help you browser safer.
Security Updates
AntiVirusYou should be running a real time antivirus program including both active protection and continuous updates and at least weekly full scans. I recommend Eset's Nod32 or Sunbelt Software's Vipre Premium.AntiMalwareIn addition to your antivirus program, I recommend a scanning program to check for malware your antivirus might miss. I do not normally recommend that this run all the time. Just do a monthly scan. My current favorite is the free Malwarebytes.Software FirewallWindows provides a reasonable software firewall which is improved in Windows 7. Sunbelt's Vipre Premium offers an even better one. Either is fine.Intrusion Detection and Startup ControlIf something get past all your security and gets into your machine, possibly riding along with something you really did want to install, you need a way to find out and stop it. I suggest using Winpatrol for this purpose. It alerts you of new startup programs and services and also of changes in the hosts file and file associations. It allows you to see and control both windows startup programs and browser helper objects.Good General PracticesYou should clean out your temp files and defragment your hard drive monthly. Microsoft provides acceptable programs for doing that.BackupThis is your final line of defense. You must have good backups. I strongly recommend both local backups to an external hard drive (not the regular one on your computer), as well as off-site backups. I support both Mysecurebackup (my own OEM online backup solution) and Ibackup as offsite solutions. I recommend Second Copy for local backups.Date: September 2010
This article is licensed under a Creative Commons Attribution-NoDerivs 3.0 Unported License. |
||
|