Newspaper headlines over the past few weeks offer proof that attacks against corporate computer networks are frequent and a poorly configured personal computer represents choice prey for intruders.
As the Conficker worm continues to attack corporate computer networks, Sophos, one of the world leaders in security solutions, reports that a Web page is infected every five seconds - not much to reassure us.
However, following a number of simple rules can significantly reduce the risk of outside intrusions. Even though Zero risk does not exist, annual growth in the software and hardware industry of 16% is anticipated over the next five years, representing $ 58 billion in sales!
Certainly the market is in full expansion, but following these simple rules can offer protection, and without breaking the bank!
RULE 1
Use high quality passwords.
A password allows access to a computer and the data it contains. For this reason, its quality is essential. In other words it must be difficult for automated tools to discover, or for a third person to guess.
RULE 2
Work should be backed-up regularly.
One of the best protections from outside attacks is to keep a copy of all the data or an image of your hard disk. This means copying all the programs and data on the hard disk and storing it in a secure location. Backing-up data is one of the essential conditions for ensuring security.
RULE 3
Do not be too quick to click on a link.
You receive a message in your email box inviting you to click on an image or piece of text. In going to the site in question, without your knowledge, you could be downloading a Trojan type program that could take control of your computer. A contaminated email is one of the solutions hackers like best since it enables them to avoid your firewall.
RULE 4
De-activate the ActiveX and Java components in your browser by default.
These components offer interesting multimedia functions but they also present a security risk that can go as far as allowing a hacker to control a computer from a remote location
In general, these browser functions should be de-activated unless you are sure you are at a site you can trust.
RULE 5
Never use an administrator's account to browse.
The use of a computer provides a privilege or right in its regard. By limiting these rights, you also limit the computer's risk of infection or compromise.
RULE 6
Ensure the operating system and software are up to date.
In general hackers look for corporate computers or servers (Apache, Windows Server?) with software that has not been up-dated, so that they can take advantage of uncorrected flaws to enter. So, be sure to regularly download the latest updates of your software.
RULE 7
Be careful when surfing on the Web - Use your common sense.
For example, if a correspondent you know well and with whom you regularly correspond in English suddenly sends you a text in French or another language, you would be advised to avoid opening it.
About All-Internet-Security.com
This security directory offers relevant computer security information for home and non-technical users. Besides, this Website is updated several times a day, and contains a comprehensive data of vulnerabilities, security news, articles and tools.
The All-Internet-Security.com Directory
Jennifer Smith
Toll Free: 1 888 234-8393 (USA - Canada)
Phone:???? 1 450 321-2294
http://www.all-internet-security.com/
# # #
No comments:
Post a Comment