Skip navigation.
 
Your Ad Here
Home
Thursday
Aug 07

Is your Computer Data Safe?

Individuals, businesses and major companies rely heavily on their computer systems. If this data is damaged, lost or stolen, it can lead to a huge disaster. Shielding your computer from online threats is easier than you think. Try these simple defensive steps.

" title="Is your Computer Data Safe?"/>

Individuals, businesses and major companies rely heavily on their computer systems. If this data is damaged, lost or stolen, it can lead to a huge disaster. Shielding your computer from online threats is easier than you think. Try these simple defensive steps.

Update your Operating System (OS):
Whether you use the Windows or Mac operating systems (OS), it must be updated regularly to shore up your computer’s defenses. On a PC, go to "Windows Update" under the Start icon and click to install all security-related updates. On a Mac, go to "Software Update" in your system Preferences (OS X) or under Control Panels (OS 9). Set the feature to update automatically each week.

Install a firewall:
Hackers can enter your computer if you don’t have a firewall in place, such as ZoneAlarm (zonelabs.com), which can warn you each tme your computer accesses the Web.

Install antivirus software:
You need the most updated anti-virus programs to ensure your hard drive and e-mail are uninfected. Two popular brands are Symantec’s Norton AntiVirus (symantec.com) and McAfee’s Internet Security Suite (mcafee.com). Run the software weekly.

Fight spyware:
Sypware enters your computer when you’re online, and reports your activities to companies that then try to sell you products. To remove spyware, download an anti-spyware program such as Ad-Aware (lavasoftusa.com). Run the program daily.

Change web browsers:
Viruses that enter your PC via Internet Explorer can do serious damage. Experts recommend considering other free alternatives such as firefox, available at mozilla.org.

Others measures that can be taken to keep data secure include:
• Make regular back-ups of files.
• Use a system of passwords so that access to data is restricted.
• Allow only authorized staff to access important computer data
• Avoid accidental deletion of files by write-protecting disks.
• Use data encryption techniques to code data so that it makes no apparent sense.

( Tags: )

Post new comment

Please solve the math problem above and type in the result. e.g. for 1+1, type 2
The content of this field is kept private and will not be shown publicly.