Wednesday, February 10, 2010

Guide to Internet Security

In the earlier days of the internet, user security wasn't as tight. There were fewer threats to users and those that existed tended to target businesses instead of individuals. Now, however, threats seem to be looming around each and every corner. As computer and internet use has proliferated in the past decade, so has the variety of viruses, malware, spyware, and other security threats. Understanding your computer's security risk, and actively working to protect it, has become a key element in responsible computing.

The Threats

Malware typically presents itself in several forms.

- Viruses - These are small programs that attach to other code and infect it. Viruses can change certain computer settings, corrupt files, or even crash your computer entirely.

- Spyware - This type of software is typically installed on your computer without your knowledge. Its intent is to gather personal information about you. Sometimes spyware may include a key-logger, which transcribes every key you type and compromises passwords, bank account numbers, credit card numbers, and anything else you might type out on your computer.

- Phishing scams - Scams are typically e-mails or websites, made to look legit, that ask you for your personal information or credit card information. The goal of these scams is obvious--to gain access to your personal information.

- Spam - Another threat that comes via e-mail, spam can contain spyware hidden in messages that will install itself on your computer.

How to Protect Yourself

Your first line of defense against malware is a firewall. Firewalls monitor all in and out computer traffic and prevent unauthorized communications. While computers typically come with firewalls installed, they are sometimes not as effective as commercial firewalls.

Another crucial defense is to install anti-virus software on your computer. While some anti-virus software is free, this is one area that you don't want to skimp on. If you install a free anti-virus program and your computer is attacked by something that slipped through the cracks, you will end up paying to fix or replace your computer anyway. It is always better to avoid the headache and ensure that your computer is receiving the best security from the get-go. Anti-key-logging and anti-spyware software are also excellent tools to use in conjunction with an anti-virus.

Spam blockers are useful for preventing spam, malicious or not, from entering your inbox. The only down side to spam blockers is that they can sometimes mistake normal e-mails for spam and filter them accordingly. If you are using a spam blocker, it is helpful to check in the box on occasion to be sure that everything is sorted correctly.

Also, on shared computers, always make sure your data is password protected. People often underestimate the security threat posed by others that have direct access to your computer. If you have information that you would not want to make readily available to other users, be sure to password-protect it with a strong password.

Useful Tips

  • Ensure that every computer you own that accesses the internet has a virus protection program installed and running.
  • Don't open attachments from unknown sources.
  • Make your passwords complicated and difficult for others to figure out. Strong passwords make use of numbers, letters, and symbols.
  • Avoid sending too much personal information, particularly credit card numbers and bank account numbers, over the internet. If you use a credit card to pay for something online, be sure that the payment system is trustworthy and secure.

Imaging Network Technology is a computer support service that specializes in computer security, 24/7 tech support, and network infrastructure. Visit Imaging Network Technology.