Technology by Design

Technology news, reviews, and how to keep your technology running fast and smooth!

  • Home
  • About TbyD
    • Who is TbyD
    • Why Choose TbyD?
    • 16 Things
    • Your Computer Guy
  • Products and Services
    • Business Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
      • Performance Analysis
      • Optimization
      • Core Security Solution
      • Managed Backups
      • Computer and Network Systems
      • Computer Setup
      • Domain Names
      • Email Services
      • Extended Warranties
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
      • Websites
    • Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
        • Computer Setup
      • Core Security Solution
      • Managed Backups
      • Extended Warranties
      • Performance Analysis
      • Optimization
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
    • Products
      • Computers
      • Servers
  • Testimonials
    • What Our Clients Say About Us
  • Blogs
    • ALERTS
    • FAQ
    • How To Videos
  • Newsletters
    • TechTips Newsletters
  • Reviews
  • Media
    • Email Red Flags
    • E-Books
    • Disaster Prevention Planning Kit
    • Free Reports
  • Contact Us
    • Contact Us
    • Quick Support

Protect The Keys to The Kingdom…and Other Security Measures

July 10, 2012 by The T By D Team Leave a Comment

Question:

Hackers, malware, viruses, phishing scams…there are so many ways that people can get into your computer and jeopardize your computer and it’s data.  What can I do to prevent all of this?

Answer:

There are many assaults on your computer’s security these days, and the consequences of not having a secure computer is huge.  Here are 6 vital steps that will help to keep your computer locked up tight…and your data safe from those pests:

1.  Block Malware

One of the most important things on your security list for any computer, is to make sure it’s running antivirus software.  With many free options, as well as paid ones, there really is no excuse not to.  Of course, with so many options, comes different security features.  Some features that are a must-have are real-time protection and frequently updating virus definitions.  These updates are usually very small, so they don’t take much time or energy when downloading/installing, but they are an easy way to make sure that your system is protected from the latest malware out there.

2.  Stay Current

Security is constantly being updated.  So it’s very important to keep your PC updates coming by turning on automatic updating.  To do so, click “Start”, then “Control Panel”, then “System And Security”.  Then, on the hyperlink underneath “Windows Update”, click the “Turn Automatic Updating On Or Off”.  Then choose the “Install Updates Automatically” option.

3.  Change Your Passwords Regularly

Your passwords are the keys to your PC kingdom, and they should be protected as such.  If you use one single password for all your PC applications (banking, social networks, email, etc) then you’re putting yourself (and your information) at risk by making it easy for hackers to access everything once they hack the one password.  Pick 3 or 4 passwords, making them difficult to guess by using upper & lowercase letters, as well as numbers.  The more characters in your password, the more secure.  If you use several passwords that are hard to remember, you can use a ‘Password Manager’ (see blog titled “Magic Password, Please…”).

4.  Secure Your Wi-Fi Network

Your Wi-Fi network provides an open invitation to anyone driving by to have access to your PCs, notebooks or devices.  To prevent this, you need to enable your router’s security protocols.  Most routers support WPA (Wireless Protected Access) or WPA2 encryption.  WEP (Wireless Encryption Protocol), is an older technology (aka more vulnerable), but it can be used if no other option is available…it’s better than nothing!  To enable these protocols, you have to log into your Router’s setup utility using a browser and the router’s IP address.  You may need consult your router manual (yes…directions!).  From there you will choose your security type, and input a password (don’t choose the same one you use for everything else!).  By doing this, any device attempting to access your network will have to use this password.

5.  Permanently Delete Files

We create and destroy computer files daily.  BUT are they really being destroyed?  Getting rid of files (especially sensitive ones) is vital to your computer’s security, and dumping them in your recycle bin doesn’t cut it.  Even if you are diligent about regularly emptying the recycle bin, it still does not ensure the security of your computer.  Hackers have their ways of finding and recovering those files.  To ensure that deleted files are deleted permanently, you need a third-party application.  Unfortunately, you’ll have to pay for this, but it’s much cheaper than having some hacker find and use those sensitive files!  You can try WebMinds’ ‘Easy File Shredder’ (www.easyfileshredder.com).  This program ensures that those deleted files stay deleted.  It also protects your whole disk drive and lets you shred files on USB and SD cards.

6.  Enable User Account Control

User Account Control is the security that notifies you anytime a program or user attempts to make changes to Windows settings or to install something on your PC.  To access User Account Control, click “Start”, then “Control Panel”, then “System And Security”.  Then find the “Action Centre” section at the top of the window, and click “Change User Account Control Settings”.  The settings with the maximum security for your PC is “Always Notify” and “Default”.  Only users that run applications not certified for use on Windows 7, are recommended to drag the slider to the bottom two settings.

By making sure you follow this short list, you are ensuring that your PC is more secure against the ne’er-do-wells out there that are bound & determined to find your favorite pasta recipe that is saved on your computer…or your banking information.

If you have a question for our resident geek, email geek@tbyd.ca.  We’ll answer your question…AND translate it from geek-lish to English!

 

Filed Under: FAQ

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Sign Up For The Monthly TechTips Newsletter!

* = required field
unsubscribe from list

powered by MailChimp!

Recent Posts

  • ALERT: Celebrity Death Scams
  • ALERT: Uber Hacked
  • ALERT: Netflix Email Scam
  • ALERT: Bad Rabbit
  • Scam – Reset Password Alert

Recent Comments

  • ALERT: New Ransomware Targets MS Office 365 Users - Technology by Design on Managed Backups
  • ALERT: FBI Warns Email Extortion Heating Up for Summer! - Technology by Design on ALERT: AshleyMadison Hack Blows Up
  • ALERT: Evil Android Trojan Empties Your Bank Account - Technology by Design on Definition: Phishing
  • ALERT: HTML Attachments - Technology by Design on Definition: Phishing
  • ALERT: New Ransomware Also Steals Your Bitcoins - Technology by Design on Managed Backups

Copyright © 2025 · Dynamik Website Builder on Genesis Framework · WordPress · Log in