How to secure and protect your systems:
How to secure and protect your systems following are the very important tips regarding systems security
1. Protect with passwords.
This may seem like a no-brainer, but many cyber-attacks succeed precisely because of weak password protocols. Access to all equipment, wireless networks, and sensitive data should be guarded with unique usernames and passwords keyed to specific individuals. The strongest passwords contain numbers, letters, and symbols, and aren’t based on commonplace words, standard dictionary terms or easy-to-guess dates such as birthdays. Each user should further have a unique password wherever it appears on a device or network. If you create a master document containing all user passcodes, be sure to encrypt it with its own passcode and store it in a secure place.
2. Design safe systems.
Reduce exposure to hackers and thieves by limiting access to your technology infrastructure. Minimize points of failure by eliminating unnecessary access to hardware and software, and restricting individual users’ and systems’ privileges only to needed equipment and programs. Whenever possible, minimize the scope of potential damage to your networks by using a unique set of email addresses, logins, servers, and domain names for each user, workgroup or department as well.
3. Avoid unknown email attachments.
Never, ever click on unknown email attachments, which can contain viruses, Trojan programs or computer worms. Before opening them, always contact the sender to confirm message contents. If you’re unfamiliar with the source, it’s always best to delete the message, then potentially blocking the sender’s account and warning others to do the same. Phishing scams operate by sending innocent-looking emails from apparently trusted sources asking for usernames, passwords or personal information. Some scam artists even create fake Web sites that encourage potential victims from inputting the data themselves. Always go directly to a company’s known Internet address or pick up the phone before providing such info or clicking on suspicious links.
4. Use a virus scanner, and keep all software up-to-date.
Whether working at home or on an office network, it pays to install basic virus scanning capability on your PC. Many network providers now offer such applications for free. Keeping software of all types up to date is also imperative, including scheduling regular downloads of security updates, which help guard against new viruses and variations of old threats.
5. Keep sensitive data out of the cloud.
Cloud computing offers businesses many benefits and costs savings. But such services also could pose additional threats as data are housed on remote servers operated by third parties who may have their own security issues. With many cloud-based services still in their infancy, it’s prudent to keep your most confidential data on your own networks.
Simple, but critical steps to protect your computer,
- Install Firewall.2.Install Antivirus Software.3.Use Complex and Secure Passwords.4.Check the Security Settings of the Browser.5.Invest intrusted, multi-faceted security software.6 Always access the Internet from behind a firewall.7 Use a PC you know is secure.8. Watch out for phishing scams. 9. Secure your wireless network. 10.Manage Your Technology Life Cycle. 11. Establish a Password Security Policy. 12. Back Up Your Data Frequently. 13. Secure Your Mobile Devices. 14. Communicate Your Information Security Policies. 15. Restrict Access to Your Data. 16. Implement a Contingency Plan. 17. Create smart and strong passwords. 18. Use email wisely. 19. Be smart when using instant messaging (IM) programs. 20. Shop safely. 21. Watch out for phishing scams. 22. Fun and carefree online gaming. 23. Pay attention to your children’s online activities. 24. Keep your software up to date.25. Don’t click on links within emails. 26. Minimize downloads. 27. Use a pop-up blocker.