10 Things You Might be Doing to Risk Your Computer's Security
Published on 21 February 14
0
0
Computers bridge us to the digital world. We use them for a multitude of tasks including online shopping, banking, academic research, blogging, storing personal and official information, and staying connected with friends and family to name a few. But unfortunately, we take these gadgets for granted. While we heavily rely on them, we often tend to put their security needs on the back burner. Here, we have outlined 10 simple habits that might be exposing your computer to hackers.
1. Trusting Every Email that Hits your Inbox
An unknown, unexpected or unwanted email can give the Pandora’s Box a run for its money. One of the oldest tricks in the book of hackers is spreading malware via emails and email attachments.
What to do? - Trash such emails. Even if an email looks like it has been sent from a known or trusted source, verify it with the sender before opening it. Consider using email security. It can help reduce the risk of such threats.
2. Keeping the Same Password for Every Account on the Internet
Keeping the same password for all your online accounts is like handing over your house keys to every Tom Dick and Harry in the neighborhood. If a hacker manages to hack one account of yours, then the odds are, they won’t take much time to compromise the rest of your accounts.
What to do? - Keeping a unique password for 50 odd accounts can put an elephant right on top of your head. But then, you have the luxury of using a password manager. These applications not only store your passwords safely but allow you to access them from multiple computers.
3. Ignorance of Phishing Scams
One harmless looking phishing email can jeopardize your financial life and identity to a point that could be beyond repair. Phishing scams have been a menace to individuals and organizations alike. Typically, such scams work by sending emails to the targeted victim and tricking them into giving away their private information. Such emails can also redirect the victim to a bogus site that looks like a genuine one, where the user is asked for their details.
What to do? - Consider reading about phishing attacks, their types and how to avoid them. Also get phishing protection for your computer.
4. Obsession with Free Software
We just adore the concept called ‘free’; we love it, we always wish for it, and we fall for it too. Free software or freeware are just one of the many carriers used by hackers to deploy malware attacks on their target. Having said that, not all websites hosting freeware are suspicious and malicious. But telling such genuine websites from the shady ones can be a bit tricky.
What to do? - Run a search on the website and the freeware it is providing before installing in on your computer. Look for its ratings or what others have commented on it.
5.Hating Windows Updates
Not expressing your love for Windows updates can be a costly affair, where you would have to bear all the expenses. Exploits are security vulnerabilities that can allow hackers to turn your computer into a zombie to carry out their malicious deeds.
What to do? - Turn on automatic Windows updates. These updates are like vitamins for your computer. They are non-fatty too; they help improve your system performance.
6. Clicking and Sharing Shocking Video Posts on Facebook
You must have come across posts on Facebook claiming to show shocking, terrifying or unusual videos. If you click such posts, you will either infect your system with a virus or end up filling up a bogus survey form. And yes, there won’t be any videos as promised.
What to do? - Shocking or terrifying incidents do occur and people do make good footages out of them. But to be on a safer side, when any such posts pop up on Facebook, get them verified first from other sources. And remember, curiosity did kill the cat!
7. Online Shopping Using Unsecured WiFi Hotspots
Activities such as online shopping, banking or even logging into online accounts on unsecured WiFi networks give a world of opportunity to hackers. With easily available tools, even a dumb hacker can spy on the information you are giving away over such networks.
What to do? - Use free WiFi hotspots for browsing and stuffs that do not require you to login in or give away any personal information.
8. Sharing Personal Information on Social Networking Sites
For once, let’s treat social networking sites for what they are, and not as our confidant. In other words, avoid making your personal information public on such sites. Such information could become the one missing link a hacker is looking to complete his evil plan.
What to do? - Keep personal information personal.
9. Keeping Your Pet’s Name as Your Password
Passwords are called “passwords†for a reason. They are supposed to be a mystery, hard to guess, and tough to crack by hackers. Choosing a password as simple as your pet’s name or any other word in the dictionary is what every hacker wishes for when they are at work.
What to do? - Create passwords that are:
- at least 8 characters long
- contain at least one uppercase letter
- have special characters such as @#$%_
- have a mix of phrases
See also: Tips for Creating Stronger Passwords
10. Not Using a Multilayered Security Solution for Your Computer
The present day’s malware scoffs at the traditional antivirus software. Our digital assets are surrounded by threats that are multifaceted. And these threats can easily materialize if your computer security software is only good in dealing with viruses.
What to do? - Cocoon your computer with a security software that not only wards off known threats but is even tenaciously strong against the unknown ones. Here are some features that characterize a reliable and multilayered security solution:
- Certified by AV-Test Institute, ICSA Labs, and Virus Bulletin
- Light on the system resources
- Automatic virus updates
- Ease of use
- Dedicated technical support service
With new and nastier types of malware threats emerging on the Internet, there is no silver bullet for computer security threats. But if you combine a reliable security software with cyber awareness and common sense, you will have lesser things to worry about. Stay safe!
This blog is listed under
IT Security & Architecture
Community
Related Posts:
Post a Comment
You may also be interested in
Share your perspective
Share your achievement or new finding or bring a new tech idea to life. Your IT community is waiting!