MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

10 Things You Might be Doing to Risk Your Computer̢۪s Security

Published on 21 February 14
412
0
0
Computers bridge us to the digital world. We use them for a multitude of tasks including online shopping, banking, academic research, blogging, storing personal and official information, and staying connected with friends and family to name a few. But unfortunately, we take these gadgets for granted. While we heavily rely on them, we often tend to put their security needs on the back burner. Here, we have outlined 10 simple habits that might be exposing your computer to hackers.

1. Trusting Every Email that Hits your Inbox
An unknown, unexpected or unwanted email can give the Pandoraâs Box a run for its money. One of the oldest tricks in the book of hackers is spreading malware via emails and email attachments.

What to do? â Trash such emails. Even if an email looks like it has been sent from a known or trusted source, verify it with the sender before opening it. Consider using email security. It can help reduce the risk of such threats.

2. Keeping the Same Password for Every Account on the Internet
Keeping the same password for all your online accounts is like handing over your house keys to every Tom Dick and Harry in the neighborhood. If a hacker manages to hack one account of yours, then the odds are, they wonât take much time to compromise the rest of your accounts.

What to do? - Keeping a unique password for 50 odd accounts can put an elephant right on top of your head. But then, you have the luxury of using a password manager. These applications not only store your passwords safely but allow you to access them from multiple computers.

3. Ignorance of Phishing Scams
One harmless looking phishing email can jeopardize your financial life and identity to a point that could be beyond repair. Phishing scams have been a menace to individuals and organizations alike. Typically, such scams work by sending emails to the targeted victim and tricking them into giving away their private information. Such emails can also redirect the victim to a bogus site that looks like a genuine one, where the user is asked for their details.

What to do? â Consider reading about phishing attacks, their types and how to avoid them. Also get phishing protection for your computer.

4. Obsession with Free Software
We just adore the concept called âfreeâ; we love it, we always wish for it, and we fall for it too. Free software or freeware are just one of the many carriers used by hackers to deploy malware attacks on their target. Having said that, not all websites hosting freeware are suspicious and malicious. But telling such genuine websites from the shady ones can be a bit tricky.

What to do? â Run a search on the website and the freeware it is providing before installing in on your computer. Look for its ratings or what others have commented on it.

5.Hating Windows Updates
Not expressing your love for Windows updates can be a costly affair, where you would have to bear all the expenses. Exploits are security vulnerabilities that can allow hackers to turn your computer into a zombie to carry out their malicious deeds.

What to do? â Turn on automatic Windows updates. These updates are like vitamins for your computer. They are non-fatty too; they help improve your system performance.

6. Clicking and Sharing Shocking Video Posts on Facebook
You must have come across posts on Facebook claiming to show shocking, terrifying or unusual videos. If you click such posts, you will either infect your system with a virus or end up filling up a bogus survey form. And yes, there wonât be any videos as promised.

What to do? - Shocking or terrifying incidents do occur and people do make good footages out of them. But to be on a safer side, when any such posts pop up on Facebook, get them verified first from other sources. And remember, curiosity did kill the cat!

7. Online Shopping Using Unsecured WiFi Hotspots
Activities such as online shopping, banking or even logging into online accounts on unsecured WiFi networks give a world of opportunity to hackers. With easily available tools, even a dumb hacker can spy on the information you are giving away over such networks.

What to do? â Use free WiFi hotspots for browsing and stuffs that do not require you to login in or give away any personal information.

8. Sharing Personal Information on Social Networking Sites
For once, letâs treat social networking sites for what they are, and not as our confidant. In other words, avoid making your personal information public on such sites. Such information could become the one missing link a hacker is looking to complete his evil plan.

What to do? â Keep personal information personal.

9. Keeping Your Petâs Name as Your Password
Passwords are called âpasswordsâ for a reason. They are supposed to be a mystery, hard to guess, and tough to crack by hackers. Choosing a password as simple as your petâs name or any other word in the dictionary is what every hacker wishes for when they are at work.

What to do? â Create passwords that are:
  • at least 8 characters long
  • contain at least one uppercase letter
  • have special characters such as @#$%_
  • have a mix of phrases

10. Not Using a Multilayered Security Solution for Your Computer
The present dayâs malware scoffs at the traditional antivirus software. Our digital assets are surrounded by threats that are multifaceted. And these threats can easily materialize if your computer security software is only good in dealing with viruses.

What to do? â Cocoon your computer with a security software that not only wards off known threats but is even tenaciously strong against the unknown ones. Here are some features that characterize a reliable and multilayered security solution:

  • Certified by AV-Test Institute, ICSA Labs, and Virus Bulletin
  • Light on the system resources
  • Automatic virus updates
  • Ease of use
  • Dedicated technical support service

With new and nastier types of malware threats emerging on the Internet, there is no silver bullet for computer security threats. But if you combine a reliable security software with cyber awareness and common sense, you will have lesser things to worry about. Stay safe!






















Computers bridge us to the digital world. We use them for a multitude of tasks including online shopping, banking, academic research, blogging, storing personal and official information, and staying connected with friends and family to name a few. But unfortunately, we take these gadgets for granted. While we heavily rely on them, we often tend to put their security needs on the back burner. Here, we have outlined 10 simple habits that might be exposing your computer to hackers.

1. Trusting Every Email that Hits your Inbox

An unknown, unexpected or unwanted email can give the Pandoraâs Box a run for its money. One of the oldest tricks in the book of hackers is spreading malware via emails and email attachments.

What to do? â Trash such emails. Even if an email looks like it has been sent from a known or trusted source, verify it with the sender before opening it. Consider using email security. It can help reduce the risk of such threats.

2. Keeping the Same Password for Every Account on the Internet

Keeping the same password for all your online accounts is like handing over your house keys to every Tom Dick and Harry in the neighborhood. If a hacker manages to hack one account of yours, then the odds are, they wonât take much time to compromise the rest of your accounts.

What to do? - Keeping a unique password for 50 odd accounts can put an elephant right on top of your head. But then, you have the luxury of using a password manager. These applications not only store your passwords safely but allow you to access them from multiple computers.

3. Ignorance of Phishing Scams

One harmless looking phishing email can jeopardize your financial life and identity to a point that could be beyond repair. Phishing scams have been a menace to individuals and organizations alike. Typically, such scams work by sending emails to the targeted victim and tricking them into giving away their private information. Such emails can also redirect the victim to a bogus site that looks like a genuine one, where the user is asked for their details.

What to do? â Consider reading about phishing attacks, their types and how to avoid them. Also get phishing protection for your computer.

4. Obsession with Free Software

We just adore the concept called âfreeâ; we love it, we always wish for it, and we fall for it too. Free software or freeware are just one of the many carriers used by hackers to deploy malware attacks on their target. Having said that, not all websites hosting freeware are suspicious and malicious. But telling such genuine websites from the shady ones can be a bit tricky.

What to do? â Run a search on the website and the freeware it is providing before installing in on your computer. Look for its ratings or what others have commented on it.

5.Hating Windows Updates

Not expressing your love for Windows updates can be a costly affair, where you would have to bear all the expenses. Exploits are security vulnerabilities that can allow hackers to turn your computer into a zombie to carry out their malicious deeds.

What to do? â Turn on automatic Windows updates. These updates are like vitamins for your computer. They are non-fatty too; they help improve your system performance.

6. Clicking and Sharing Shocking Video Posts on Facebook

You must have come across posts on Facebook claiming to show shocking, terrifying or unusual videos. If you click such posts, you will either infect your system with a virus or end up filling up a bogus survey form. And yes, there wonât be any videos as promised.

What to do? - Shocking or terrifying incidents do occur and people do make good footages out of them. But to be on a safer side, when any such posts pop up on Facebook, get them verified first from other sources. And remember, curiosity did kill the cat!

7. Online Shopping Using Unsecured WiFi Hotspots

Activities such as online shopping, banking or even logging into online accounts on unsecured WiFi networks give a world of opportunity to hackers. With easily available tools, even a dumb hacker can spy on the information you are giving away over such networks.

What to do? â Use free WiFi hotspots for browsing and stuffs that do not require you to login in or give away any personal information.

8. Sharing Personal Information on Social Networking Sites

For once, letâs treat social networking sites for what they are, and not as our confidant. In other words, avoid making your personal information public on such sites. Such information could become the one missing link a hacker is looking to complete his evil plan.

What to do? â Keep personal information personal.

9. Keeping Your Petâs Name as Your Password

Passwords are called âpasswordsâ for a reason. They are supposed to be a mystery, hard to guess, and tough to crack by hackers. Choosing a password as simple as your petâs name or any other word in the dictionary is what every hacker wishes for when they are at work.

What to do? â Create passwords that are:

  • at least 8 characters long
  • contain at least one uppercase letter
  • have special characters such as @#$%_
  • have a mix of phrases


See also: Tips for Creating Stronger Passwords

10. Not Using a Multilayered Security Solution for Your Computer

The present dayâs malware scoffs at the traditional antivirus software. Our digital assets are surrounded by threats that are multifaceted. And these threats can easily materialize if your computer security software is only good in dealing with viruses.

What to do? â Cocoon your computer with a security software that not only wards off known threats but is even tenaciously strong against the unknown ones. Here are some features that characterize a reliable and multilayered security solution:

  • Certified by AV-Test Institute, ICSA Labs, and Virus Bulletin
  • Light on the system resources
  • Automatic virus updates
  • Ease of use
  • Dedicated technical support service


With new and nastier types of malware threats emerging on the Internet, there is no silver bullet for computer security threats. But if you combine a reliable security software with cyber awareness and common sense, you will have lesser things to worry about. Stay safe!

This blog is listed under IT Security & Architecture Community

Post a Comment

Please notify me the replies via email.

Important:
  • We hope the conversations that take place on MyTechLogy.com will be constructive and thought-provoking.
  • To ensure the quality of the discussion, our moderators may review/edit the comments for clarity and relevance.
  • Comments that are promotional, mean-spirited, or off-topic may be deleted per the moderators' judgment.
You may also be interested in
Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top