101 Internet Security Tips
101 Internet Security Tips
Using security software won’t help if it’s not up to date. Be sure that
you are using the latest versions of spam, spyware and virus-detection
software. The most current software will be ready to handle the most
current on-line threats. Also remember to renew subscriptions if the
software registration expires at some point.
3. Use anti-virus software.
5. Update automatically.
7. Block Pop-ups.
When you are not actively using your computer, shut down or
disconnect from the Internet. If your computer is on-line less frequently,
the chance of access by a malicious source decreases.
If you take a break from your computer for only a few minutes, it's
enough time for a hacker to destroy or steal your information. Locking
your computer password-protects your session until you return and
prevents anyone else from physically or remotely accessing your
information.
12. Be careful with public computers.
Simply having antivirus software installed will not help your computer
from being attacked. Scan for viruses on a regular basis, or set the
software to do automatic scans at a certain time daily.
17. Double your spyware protection.
Create separate free e-mail addresses for different purposes. Use this
ìdisposableî e-mail account to register for sites or complete surveys that
may result in increased spam. If the spam becomes overwhelming,
close the account and create another. This will keep the junk mail from
your regular e-mail account, as you continue to use your regular e-mail
address for business or personal communication.
When shopping on-line, credit cards offer higher protection than debit
cards or other payment options. Credit card issuing banks offer
protection against fraud that debit cards and checking accounts do not.
If only one card is used for all online transactions, misuse or identity
theft will be easier to detect than if multiple cards were used. Using a
single card will also minimize the damage you experience if the card
number is stolen.
21. Avoid saved passwords.
Only enter personal information on sites that have the https:// prefix or a
padlock icon in your browser window. This means that the Web site is
secured and any information transmitted is encrypted and can not be
read easily by humans.
23. Don't assume that secure and honest are the same thing.
On-line criminals often create Web sites that look similar to another site
and use common misspellings of the original site as the URL. Be sure
that you are typing accurately, or use a bookmark to visit favorite sites.
Emails that appear to be legitimate and ask for information are forms of
phishing. If you receive a phishing e-mail, forward it to the appropriate
bureaus, including the Anti-Phishing Working Group
([email protected]) and the Federal Trade Commission
([email protected]).
Look at your bank and credit card statements for suspicious or unknown
transactions. These are often a signal of identity theft. Report these
situations to your bank as soon as possible.
Choose password that would be hard for others to guess. Do not use
obvious passwords like a name or birth date. Use a combination of
letters, numbers and symbols in your password and do not share your
password with anyone.
Make a back up of your hard drive onto an external media device. The
act of making a back up copy does not offer protection, but it is
insurance that nothing will be lost should a computer security disaster
occur.
Use power strips and surge protectors to protect your computer against
sudden power outages. During a storm when a power surge is likely,
shut your computer down and unplug it to prevent any loss of
information.
Do not open email attachments from strangers unless the security and
anti-virus software on your computer verifies that they are safe. Always
delete any spam or junk email that contains an attachment.
39. Never open certain attachments.
Viruses are often sent as email attachments. Avoid opening any file
with an extension that is .exe, .pif, .com or .bat, regardless of who they
are from. These are almost always harmful files.
Many malicious sites use pop-ups that look very similar to the ones that
your operating system may use to tell you that there is a security risk for
your computer. These are ploys to get you to click on the ad; if you do
click, the site usually installs spyware or malware on your computer.
Close these ads by clicking on the X in the top right corner.
Pirated software is illegal, and the sites that distribute it are often loaded
with malware. This admonition goes beyond software, including crack
key generators, and pirated music or movies. Unlicensed software is
sometimes incompatible with patches and can be more susceptible to
viruses. It may even come with viruses previously installed.
If you use Windows, visit Windows Update on a regular basis. The site
will scan your computer for any updates or patches that are not installed
on your computer. Then it will create a list of the items recommended
to update your computer. Download anything marked as a critical
update to keep your computer secure.
If you are a Mac user, check the Apple Security Site for new updates
and download them if they are available.
49. Protect your identity:
Children face many unique risks with Internet activity. Monitor your
children’s on-line activity and use parental filters or other tools to protect
them from threats and security risks.
Portable USB drives are a convenient way to store information, but their
small size makes them easy to lose. Consider encrypting the data
stored on these drives, in case of loss or theft. If you find someone
else’s USB drive, do not plug it into your computer. Hand it over to
authorities instead.
Have children keep a list of any sites that they visit so you can review
for potential spyware and other risks. Do not let children register with
Web sites without permission.
54. Use a spam filter.
If your e-mail program separates spam and junk mail, use these
features. This will filter away the scams and malicious messages so
that there is no chance of accidental response or infection.
These updates will give you timely information about current Internet
security issues. Knowing the risks is important to effectively protect
your home and business computers.
58. Be cautious with chat and instant messaging.
An e-mail spam filter will catch most spam and junk mail messages, but
some may still get through. Train your e-mail service to recognize junk
by marking junk mail messages in your inbox as spam. The e-mail
service will know to direct similar messages to the spam folder in the
future.
Review the terms and conditions for any site you register with. Most
have a checkbox for whether you would like to receive updates and
offers from sponsors. Be sure that this box is left unchecked, or you
could end up receiving lots of junk mail and spam. Most reputable sites
include a statement explaining that they do not sell or share your e-mail
address with other companies.
Don’t say anything on-line that you would not tell anyone you never
met. This is especially important for social networking sites, like Twitter
or Facebook. Be sure not to divulge addresses of where you are or full
names of who you are with. Too much information can be an invitation
for a stranger to show up at your location.
Be careful about your e-mail and Internet activity at work. In most of the
United States, any activity conducted on a work computer is property of
the employer. Not only could inappropriate activity result in work-
related disciplinary action, but you could end up divulging personal
information to strangers at your place of business.
Cookies are the way that Web sites store personal information. Not all
cookies are bad, but some companies sell this information to other
companies for marketing purposes. You can delete unnecessary
cookies through the Internet options section of your browser.
72. Secure mobile connections.
When using Wi-Fi, hot spots or Internet cafes, be sure that webmail is
secured with the https:// prefix. Also be aware of those around you who
may watch you type passwords or other personal details.
All the security precautions in the world will not protect your computer if
it is physically vulnerable to theft. Always keep your laptop in sight
when travelling. If a private computer is kept in a home with roomates
or family members, consider locking the door to the computer room
when you are not around.
Secured sites should change from the http:// prefix to https:// or shttp://
at the moment when you are prompted to type in a user name and
password.
Each consumer is entitled to a free copy of his or her credit report each
year. Order copies of credit reports from the three reporting bureaus
annually, and review for incorrect information or unfamiliar accounts.
Dispute any errors immediately.
77. Use separate computers for leisure and personal business.
If possible, stop Web surfing on the computer that you use for on-line
banking or shopping. This will limit the amount of cookies, spyware and
monitoring and can reduce the incidence of identity theft.
Even if you are talking with someone in a private chat room, chat
services often archive conversations on a server. You have no control
over what happens to archived conversations. Even if you feel that
everything is secure on your end, remember that you don’t know if the
person you are chatting with has someone watching his or her
interactions with you.
81. Browse with care.
Be cautious about the Web sites that you visit, and if a site seems
suspicious, close your browser and leave the site. Most Web sites are
able to track bits of information from your computer, like IP address and
the software that you use, for marketing purposes. While this
information collection is not necessarially harmful from trustworthy sites,
Web sites that seem less legitimate can use this information for
malicious activity.
Most Wifi routers come with a generic username and password for
equipment setup. Although password-protected, this information is not
specific to the individual and therefore well known to hackers. Change
the username and password as soon as your wireless network is set
up.
Wi-Fi access points and routers use a network name called the SSID,
and routers often have a default SSID of the manufacturer name. Using
the generic SSID does not make your wireless network more
susceptible to threats, but it is a sign to others that the network is poorly
configured, making it more of a target. Shange the default SSID name
immediately when configuring your wireless security.
85. Allow MAC address filtering.
Each Wi-Fi component has a unique identifier called the MAC address,
and access points and routers keep tabs on all the MAC addresses of
devices that connect to them. Many products allow the owner to type in
the MAC addresses of his or her equipment, so the etwork will only
allow connection from those approved devices.
Access points and routers usually broadcast the SSID name at regular
intervals. This function was originally intended for roaming, but it is
unnecessary when a wireless network is used in the home. Disable the
broadcast so others will not be able to see your network.
Home Wi-Fi signals are intended to be used in the home. While some
signal may leak outdoors, keep an eye on how far the signal reaches.
The position of the router determines how far the signal will reach, so
try to place the router in the center of the home to prevent the signal
passing across streets or into different neighborhoods.
While it isn’t practical to turn off a wireless network daily, be sure that it
is disconnected if you plan to be gone on vacation or extended off-line
periods.
Before tossing out an old computer, copy all the data tha you need to
keep and erase the hard disk. Simply deleting files is not enough. Use
a program to erase all traces of personal data from the computer before
recycling or donating.
99. Assume permanence.
The Internet does not have a delete button. If you post or publish any
information and then delete it, you maintain no control over how it is
copied, stored or archived. Think before you post anything that you
may regret later.
Although you may feel comfortable with a person that you share
conversations with in a chat room, if you do not really know the person,
you can not be sure of his or her intentions. Avoid clicking on any links
or opening attachments from a chat buddy that you do not know very
well. This is a common method for hackers to distribute malicious
material directly.
If you suspect that malware is affecting your computer, stop any on-line
activities that involve usernames, passwords or other personal
information. Scan your computer with an anti-virus software, and delete
anything that the program finds to be suspicious. If the problem is not
resolved call for professional technical help from a repair shop or
manufacturer.