Saturday, 28 January 2012

Seven Rules for Internet Security from All-Internet-Security.com: How to Protect your Data and Private Life on the Web

Montreal, QC (PRWEB) July 16, 2009

Newspaper headlines over the past few weeks offer proof that attacks against corporate computer networks are frequent and a poorly configured personal computer represents choice prey for intruders.


As the Conficker worm continues to attack corporate computer networks, Sophos, one of the world leaders in security solutions, reports that a Web page is infected every five seconds - not much to reassure us.


However, following a number of simple rules can significantly reduce the risk of outside intrusions. Even though Zero risk does not exist, annual growth in the software and hardware industry of 16% is anticipated over the next five years, representing $ 58 billion in sales!


Certainly the market is in full expansion, but following these simple rules can offer protection, and without breaking the bank!


RULE 1

Use high quality passwords.


A password allows access to a computer and the data it contains. For this reason, its quality is essential. In other words it must be difficult for automated tools to discover, or for a third person to guess.


RULE 2

Work should be backed-up regularly.


One of the best protections from outside attacks is to keep a copy of all the data or an image of your hard disk. This means copying all the programs and data on the hard disk and storing it in a secure location. Backing-up data is one of the essential conditions for ensuring security.


RULE 3

Do not be too quick to click on a link.


You receive a message in your email box inviting you to click on an image or piece of text. In going to the site in question, without your knowledge, you could be downloading a Trojan type program that could take control of your computer. A contaminated email is one of the solutions hackers like best since it enables them to avoid your firewall.


RULE 4

De-activate the ActiveX and Java components in your browser by default.


These components offer interesting multimedia functions but they also present a security risk that can go as far as allowing a hacker to control a computer from a remote location


In general, these browser functions should be de-activated unless you are sure you are at a site you can trust.


RULE 5


Never use an administrator's account to browse.


The use of a computer provides a privilege or right in its regard. By limiting these rights, you also limit the computer's risk of infection or compromise.


RULE 6


Ensure the operating system and software are up to date.


In general hackers look for corporate computers or servers (Apache, Windows Server?) with software that has not been up-dated, so that they can take advantage of uncorrected flaws to enter. So, be sure to regularly download the latest updates of your software.


RULE 7


Be careful when surfing on the Web - Use your common sense.


For example, if a correspondent you know well and with whom you regularly correspond in English suddenly sends you a text in French or another language, you would be advised to avoid opening it.


About All-Internet-Security.com

This security directory offers relevant computer security information for home and non-technical users. Besides, this Website is updated several times a day, and contains a comprehensive data of vulnerabilities, security news, articles and tools.


The All-Internet-Security.com Directory

Jennifer Smith

Toll Free: 1 888 234-8393 (USA - Canada)

Phone:???? 1 450 321-2294

http://www.all-internet-security.com/


# # #





No comments:

Post a Comment