How to prevent computer viruses in 10 steps

Similar documents
things you haven t done to protect your business from cybercrime

Cyber Security Education & Awareness. Guide for User s

Protect yourself online

What you need to know to keep your computer safe on the Internet

Install and End User Reference Guide for Direct Access to Citrix Applications

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013

Remote Access End User Reference Guide for SHC Portal Access

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

Open an attachment and bring down your network?

What you can do prevent virus infections on your computer

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac?

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

Baltimore County Public Schools Department of Information Technology Network Support Services System Engineering Document

$920+ GST Paid Annually. e-commerce Website Hosting Service HOSTING:: WHAT YOU GET WORDPRESS:: THEME + PLUG-IN UPDATES

Keeping your online health and social care records safe and secure

Unity web- player issues in browsers & in client system

Cyber Security. Maintaining Your Identity on the Net

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac?

What Do You Mean My Cloud Data Isn t Secure?

This article will show you ten ways to keep you computer in in tip-top condition.

Website Security: What do I need to know? What do I need to do?

How we use cookies on our website

Citrix : Remediation - MAC

High Speed Internet - User Guide. Welcome to. your world.

Working Practices for Protecting Electronic Information

Barracuda Spam Firewall User s Guide

Internet basics 2.3 Protecting your computer

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

3 day Workshop on Cyber Security & Ethical Hacking

4/20/2015. Fraud Watch Campaign. AARP is Fighting for You. AARP is Fighting for You. Campaign Tactics. AARP can help you Spot & Report Fraud

Tracking Anti-Malware Protection 2015

Accessing your Staff (N and O drive) files from off campus

ResNet Guide. Information & Learning Services. Here to support your study and research

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

Almost 400 million people 1 fall victim to cybercrime every year.

National Cyber Security Month 2015: Daily Security Awareness Tips

Online Security Tips

Frequently Asked Questions

Scott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit.

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

STRONGER ONLINE SECURITY

Computer Security Maintenance Information and Self-Check Activities

From Data Breaches and Information Hacks, to Unsecure Computing - Know Your Defense

How Do People Use Security in the Home

CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3

How to Use Windows Firewall With User Account Control (UAC)

MONTHLY WEBSITE MAINTENANCE PACKAGES

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Cyber Security: Beginners Guide to Firewalls

Two Factor Authentication - USER GUIDE

Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Frequently Asked Questions

Security Awareness. ITS Security Training. Fall 2015

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

GRAVITYZONE UNIFIED SECURITY MANAGEMENT. Use Cases for Beta Testers

HSyE HIPAA Training. Summer 2015

Computer Network and Internet Security Awareness and Responsible Use. Indian River County School District

The Institute of Education Spam filter service allows you to take control of your spam filtering.

A practical guide to IT security

Cyber Crime: You Are the Target

Firewalls and Software Updates

Forefront Spam Filtering

TMCEC CYBER SECURITY TRAINING

Data Security. So many businesses leave their data exposed, That doesn t mean you have to Computerbilities, Inc.

Deter, Detect, Defend

Installation Instructions

Secure Your Home Computer and Router. Windows 7 Abbreviated Version. LeRoy Luginbill, CISSP

Your Laptop Guide. We re better, connected

- Outlook Web App

ANDRA ZAHARIA MARCOM MANAGER

Mac OS X. Staff members using NEIU issued laptops and computers on Active Directory can access NEIU resources that are available on the wired network.

Don t Fall Victim to Cybercrime:

Multi State Information Sharing and Analysis Center. Briefing Paper. Keeping Your Broadband Internet Connection Secure

Practical guide for secure Christmas shopping. Navid

A Quick Guide to Creating a Job Posting

Wireless Network Best Practices for General User

Student Quick Start Guide

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household

Information Security. Louis Morgan, CISSP Information Security Officer

SURPASS HOSTING SERVICE GETTING STARTED AND OPERATIONS GUIDE

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

This guide will go through the common ways that a user can make their computer more secure.

Outlook Web Access Tipsheets


Outlook Safe Sender s Filtering

HR Connect People Manager User Guide. Introduction and Navigation

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

PC/Tablet/Smartphone Security & Password Managers

Backing up your digital image collection provides it with essential protection.

Topic 1 Lesson 1: Importance of network security

Cybersecurity Best Practices

Basic Computer Security Part 2

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

ZNetLive Malware Monitoring

Transcription:

How to prevent computer viruses in 10 steps Following on from our advice on how to keep your online data secure, we ve created a follow-up outlining how you can keep your computer itself safe. Not only will these tips help protect your computer from viruses but it will prevent your system from becoming slow, crashing for no reason, and losing important files. Our computer experts (the people who make Clear Books software and keep your information safe) have put together a few of their top tips to help you keep your computer secure and protected.

1. Don t open unknown email attachments If you recognise the name of the sender, it can be tempting to go into autopilot and immediately open the attachment they ve sent you. But before you do, consider if you re expecting anything from this person. Even if you are, read the subject line and email content carefully. If an old friend has emailed you out of the blue after a decade and the email heading is offering to help you make money fast, you can probably presume it s spam. 2. Disable plugins you don t need If you never use plugins such as Flash or Java then make sure to disable them. If you don t, your machine could be vulnerable to an attack caused by an out-of-date plugin. In general, you probably won t need to use Flash or Java for most websites or programmes so it s easier to just get rid of them. 3. Don t disable UAC on Windows User Account Control (UAC) asks you to provide your username and password every time you install something new. This should always be kept enabled so that you are informed and can manually authorise any changes that are made to your computer.

4. Don t use your computer as an admin If you log in to your computer via an admin account and something harmful infiltrates your machine, all users data will be compromised and potentially become vulnerable. However, if an individual user account is affected, all other users information is protected. This also prevents other users from being able to delete your files as they can only access their own account. 5. Keep your browser updated If you re using an out-of-date browser, this can expose security vulnerabilities and allow cyber criminals to access your personal information by exploiting weaknesses. In addition, an up-to-date browser will help you have a better user experience in general. 6. Avoid Internet Explorer On a similar note, using Internet Explorer can cause potential security problems. As IE is so widely used, hackers target it more as they have a wider pool of potential victims. Mozilla and Google are also more efficient at keeping their browsers updated and protected.

7. Keep your operating system updated As well as keeping your browser updated, it s important that you also make sure your computer s operating system is updated regularly as well. The method for doing this will vary between operating systems. For Windows ensure that Windows Update is set to install updates automatically. If you re using Mac OSX, click on the Apple icon and then App Store. Select Updates from the top of the page and install any updates listed. 8. Only install software you know and trust If you re online and come across a loud and colourful banner enthusiastically offering free smileys or to make your computer 10x faster, it s probably not something you want to click on. And if it sounds too good to be true, it probably is. While there is good free software out there, it s unlikely to be advertised to you with flashing banner adverts.

9. Ensure you have up-to-date anti-virus Windows Defender (win 8) and Microsoft Security Essentials (win 7) are free from Windows Update and fine for most users purposes. Companies such as AVG, Avira and Avast also offer free options. There are paid options which might be worth investing in if you are particularly concerned about security. 10. Don t trust your email account While your email account may feel safe and secure you never know what might happen, especially if you use wi-fi in public places. If your email address is compromised, make sure that hackers can t find any sensitive information such as credit card details, passwords, or anything else you really wouldn t like others to read. www.clearbooks.co.uk twitter.com/clearbooks facebook.com/clearbooks linkedin.com/company/clear-books