Skip to main content
Computer Security
In Today’s Society, Protecting Your Computer Is A Requirement

Advancement in computer technology is a double-edged sword. On one hand, it affords us quick and easy access to numerous conveniences such as bank statements, favorite shopping centers, school and health records, and more. On the other hand, it can also grant the same access to those who aren’t supposed to get it. Although it’s a rare occurrence, hacking has become the biggest criminal nuisance in computer history.

Make no bones about it. There’s nothing innocent or cute about a hacker. Today’s hackers aren’t the pimply-faced teen rebels that you might be thinking of. Instead, these hackers are grown individuals who are more than likely earning a living by stealing the identities of innocent, law abiding individuals and then selling those identities to others who want to slip by the system. And the only protection against these seedy people is prevention.

Computer security couldn’t be more important than it is today and that’s why we’ve taken the time to introduce it to you. You can reduce the probability of experiencing identity theft by making your computer as hacker-proof as possible. All that’s needed is a little software and a lot of common sense which may not actually be common.

1. Install an anti-virus/anti-spyware program. Anti-virus/anti-spyware software will stop malicious codes from downloading and installing onto your computer while you peruse the Internet. Known as viruses, worms, malwares or spyware, this malicious code can destroy important files and render your computer good for only one thing: sending sensitive data back to the server of an identity thief.

2. Don’t store sensitive data on your computer in the first place. Should your computer get infected with a virus, worm, or piece of spyware, you can thwart the individuals responsible by not storing your personal information on your PC so that when and if your computer does send back data – it won’t be anything valuable. Hackers look for things like full names, social security numbers, phone numbers, home addresses, work-related information, and credit card numbers. If these things aren’t saved onto a computer, there’s nothing critical to worry about other than restoring your computer to a non-virus condition.

3. Don’t open files without scanning them with an anti-virus/anti-spyware program. In the past, the warning was to avoid opening files from people that you don’t know. Today it’s really not safe to open files from anyone (without scanning the files) because that’s how viruses spread – through files - even by mistake. So even though your co-worker may have emailed a funny video, it’s no more safe to open than a video downloaded from a complete stranger. Be safe and scan each and every file you download from the Internet or receive through email regardless of where it came from.

4. Create a barrier between your computer and prying eyes. Anti-virus/anti-spyware programs are only effective after the effect. But you can prevent identity theft from occurring by installing a firewall. A firewall is software that checks all data entering and exiting a computer and it then blocks that which doesn’t meet specified security criteria (user-defined rules).

5. Don’t click on website links in spam messages. In an effort to obtain personal information, some spammers will send email that asks you to click on a link. The email messages are often disguised as important messages from well-known online establishments, and they often try to scare their readers into clicking links with threats of closing an account of some sort. Sometimes the links are harmless and attempt to con the reader into volunteering personal information (credit card number), but other times the links attempt to download harmful software onto a computer.

Your best protection against computer crimes is your own knowledge. Hopefully the suggestions above will prompt you into taking appropriate action and into protecting your computer with the suggested tools. In doing so, you’ll not only protect yourself, you’ll prevent the spread of these malicious activities and protect others at the same time.

Contact Depeak Technology Services today if your computer problem is beyond what you can handle

http://depeaktech.wordpress.com/

http://depeaktech.blogspot.com/

08125338345

08039479877

08099742186

Comments

Popular posts from this blog

Laptop Batteries

If your laptop battery can not backup as it used to and you can only get thirty minutes or at most forty five of work done before you need to start  searching for an AC outlet? Sounds like it's time for a replacement battery. It is true that laptop batteries are  expensive but without a good backup your pc hard drive is at a risk and you could eventually lost your data in the occurrence of a possible crash. Price vary from one model to another but new ones sell for a few thousands of naira if you know what I mean.  There are some as high as ten to fifteen thousand naira. When you consider that brand-new laptops now sell from as low as forty five  thousand naira, it can be a hard pill to swallow. If your laptop is your primary PC, and you are sure of constant power from your AC outlet (can't vouch for that anyway) you may be wasting battery cycles by leaving it plugged in all the time. Try removing the battery until you actually need to go somewhere with your laptop. As l

Innovations for the Iphone

    The iphone or the Apple products as whole, Mac, iPad, iPod, iTunes and other of their trademarks  not mentioned are often produced with business innovations to their designs. Almost all of them starts with "i", could be the reason their prices are on the "High side". Even maintenance is expensive more reason why it is mostly out of the reach of the masses. Anyway, thank God for Andriod and other China phones with good innovations too.  Nevertheless, I saw this innovative improvements on the mophies ' and think it is worth sharing. your opinion after perusal maybe different. 2007 juice pack World’s first battery case. The  juice pack  that started it all. The original battery that you could use on-the- go, and the first external battery ever for iPhone. 2009 juice pack air World’s first fully protective battery case. We took the concept of the original  juice pack  and went a step further by turning it into the world’s first fully-pr

Let the DISCO MYTO begin

The Electricity Distribution Company has started the new tariff. Multi-Year Tariff Order Check the informations below to get the full details. It is from the  NERC website , no changes made. I am thinking this will be upgradeable since we now have MYTO 2 with amendment to MYTO 2.1. MYTO 3 and  MYTO 4 will be around the corner with remote control capability or application to control it from your phone or better still, a clap to curtail excessive usage. It can happen. Multi-Year Tariff Order (MYTO) II Details   Welcome to the section of the NERC website where all information relevant to the Multi-Year Tariff Order (MYTO) has been made available to stakeholders. The MYTO (Multi-Year Tariff Order) provides a 15 year tariff path for the Nigerian Electricity Supply Industry. The  MYTO Methodology  sets out the basis and pricing principles underlying the MYTO. The Methodology can be downloaded by clicking here On April 1, 2015, the Commission approved