Criminals might use traditional method of stealing a computer and access through the datas to obtain relevant informations that benefited them or more high tech way of stealing the datas through computer languages softwares like SQL, C++ or many more. Those without authorized keylock are of course more vulnerable to stolen datas reported because it enables anyone to accessing it. This is why many organizations provide intranet services requiring the users to use their ID and passwords often alphanumerical to create more secured environment from data theft. From my opinion, these are not enough because even with a secured password, still there are hackers that may log in and steal the datas like what has happened to many clone credit cards reported during the 2001 to 2002 from Malaysian banks. Thus, it is recommended that organizations that operated web based to have SSL encrypted as a matter of trust to users.
Online downloading is often an area to spread viruses and is a favorite target for hackers to insert spywares. Such sites are mostly porn sites and unapproved downloading sites because they did not include certificates authentication. Easily a hacker can place malicious worms in the softwares fro downloads by users. As a result, program failures often reported due to the worms like trojans and other bugs. Furthermore, some viruses are too powerful it can crack into important documents and steal the datas.
Therefore, it is more important that we learn how to safeguard our data. These are important steps to secure our computer from data theft:
First, User Account is more important to unable unauthorized people to log in your computer. First method of preventing data duplication and theft. It is also recommended that for different users, you create different accounts if the organization is large.
Second, it is important to ensure what anti virus are you using and is it firewalled to disable unwanted programs to penetrate into our computer. Anti virus must be updated and properly licensed to avoid breakdowns. It is recommended that you use latest Anti Virus such as AVG 8.0 rather than older versions because more functions are added and stronger to protect the computer systems.
Third, scanning the computer is essential. Regular scan is recommended to avoid unauthorized data to be stored that probably contained virus or corrupted files in the storage. I'm sure more computers are provided the Rootkit Revealer software that can detect malicious activities in the computer. Remember to scan pendrives or disks before opening to avoid virus contained files
Fourth, try to avoid unused software or programs because they might be corrupted if no longer used. Uninstall them if those programs are no longer necessary in use.
Fifth, Windows Update is recommended to be turned on. Important updates can help protect the computer from attackers so that they have disadvantage to known vulnerabilities.
Sixth, put up your rules as guideline so that there will be no unwanted activities on your computer systems. As example, UTAR put up a signboard that warned on step by step shutdown of computer. Children Safe Online is also a guideline to data protection and also adopted by Live Messenger such as Family Care software.
Next, you are recommended to use password and manage the authorization on important datas. This is useful if your computer are used openly by many parties. To safeguard the data, you may set the security level, hide the folder, encrypt or manage password.
Lastly, what is more important is not to give out important informations like Personal ID, PIN number and account informations especially when doing online transactions. Make sure the websites you've visited contained approved licensed and certificates such as VeriSign stamp in http://www.maybank2u.com/. Some websites provide trust because of SSL encryption in it.
http://www.wisegeek.com/what-are-the-primary-online-security-threats.htm
http://www.guard-privacy-and-online-security.com/
No comments:
Post a Comment