Tips to protect your P.C from   Risks & virusesThe Basics: Spotting and Eliminating ThreatsAs the saying goes, before you ...
Install and run anti-spyware softwareToday, the most common form of malware that internet users encounter isspyware. In fa...
Install and update anti-virus softwareA good firewall will filter out many of the threats facing your computer, however,so...
Tweaking Settings and Making Usage  AdjustmentsStrengthen your web browser securityYou connect to the internet through you...
Disable file sharing on your hard drivesWhile securing your wifi router will help keep hackers from getting access to your...
Safely EmailingEmail was originally designed to enable academics and scientists to communicatewith one another. And becaus...
Use a first-rate email client  Just because all email clients deliver your email, does not mean they are equally  effectiv...
Do not click on email links haphazardlyA common phishing scam technique is to embed a link in an authentic-looking but   f...
Set up email filtersInternet Service Providers (ISPs) are all currently developing effective spamfiltering in order to min...
Protecting Your PasswordYou would never consider setting the combination of your family safe to something   as simple as, ...
Do not use a neighbors wifi connectionOften hackers setup free, seemingly unprotected wifi connections in convenientlocati...
Be mindful of what you are clicking onMany websites that hosts harmful content will use banners and pop upadvertisements, ...
Purchase security softwareMany users are not aware that using pirated software can not protectusers computer against threa...
Accept incoming files when you expect them and from peoplethat you knowSome threats have the ability to infect machines an...
Q&A Presenation done by uK Mishra,Your comentswill be highly Appreciable~ umakant@gmx.com
Thank You                                               Presenation done by uK                                            ...
Upcoming SlideShare
Loading in …5
×

I.T Security Tips

488 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
488
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

I.T Security Tips

  1. 1. Tips to protect your P.C from Risks & virusesThe Basics: Spotting and Eliminating ThreatsAs the saying goes, before you can run, you must learn how to walk. And you canconsider your first baby step into computer security installing the basic softwareneeded to detect and eliminate threats.Use a firewallYou can think of a firewall as a sort of shell around your computer that identifies andfilters out threats, while letting secure information pass through it and reach yourcomputer. Because a firewall serves this all-important filtering role between yourcomputer and the internet, using a firewall is the very first step on the path tocomputer security. Presenation done by uK Mishra,Your coments will be highly Appreciable~ umakant@gmx.com
  2. 2. Install and run anti-spyware softwareToday, the most common form of malware that internet users encounter isspyware. In fact, a recent study estimated that 9 out of 10 computers connected tothe Internet are currently infected with some form of spyware. Spyware can take avariety of forms, however, some of the most common effects are that it causesunsolicited pop-ups to appear, steals personal information, monitors internet activityfor marketing purposes, or routes your website requests to other spammyadvertising sites. Presenation done by uK Mishra,Your coments will be highly Appreciable~ umakant@gmx.com
  3. 3. Install and update anti-virus softwareA good firewall will filter out many of the threats facing your computer, however,some malware is always going to find its way onto your PC. For example, viruses,worms, Trojan horses and other forms of malware can find their way onto yourcomputer by various means a firewall cannot detect, including downloadingmalicious email attachments and files from the internet. So to protect your PC youllalso need strong regularly updated anti-virus software. While a firewall protects yourcomputer from the outside, an anti-virus program will work from the inside of yourcomputer, hunting down hidden viruses and deleting them, while also scanningattachments and downloads before they can infect your computer. Presenation done by uK Mishra,Your coments will be highly Appreciable~ umakant@gmx.com
  4. 4. Tweaking Settings and Making Usage AdjustmentsStrengthen your web browser securityYou connect to the internet through your internet browser. And whether you useFirefox, Internet Explorer, Opera or anything else, this is a point of major weaknessin any computers defenses. Hackers often target their attacks on your computer byfocusing on flaws in browsers or their plug-ins and using drive-by downloads, to getyour computer to download malware through the browser without you even knowingthat something was downloaded. Because of this threat, web browser securityupgrades are an important early step in your PC security overhaul.Install the latest OS service packHackers are constantly developing new types of malware, some of which try toexploit weaknesses in an operating system to get into your computer. Therefore, itis important to always install the latest Windows OS Service Pack (SP) updates inorder to keep your computer secure. Microsoft releases patches and updates fortheir Windows operating systems once a month on "Patch Tuesday." Presenation done by uK Mishra,Your coments will be highly Appreciable~ umakant@gmx.com
  5. 5. Disable file sharing on your hard drivesWhile securing your wifi router will help keep hackers from getting access to yournetwork, what about the potential for harm from people who already havelegitimate access to your network? Having a firewall will certainly help, but it maynot be enough. One of the best ways to limit your exposure to intra-network harmsis by prohibiting file sharing access from foreign machines. Presenation done by uK Mishra,Your coments will be highly Appreciable~ umakant@gmx.com
  6. 6. Safely EmailingEmail was originally designed to enable academics and scientists to communicatewith one another. And because it was created with the thought that only trustedindividuals would send files back and forth, emails security weaknesses were nevera concern while the technology was being developed. Unfortunately, spammers andhackers came along with the popularity of email, but by then the technology was fartoo popular to redesign. As a result of its inherent security weaknesses, it is veryimportant to take the necessary steps to strengthen your email security through add-on protections and by tailoring the way you use your email Presenation done by uK Mishra,Your coments will be highly Appreciable~ umakant@gmx.com
  7. 7. Use a first-rate email client Just because all email clients deliver your email, does not mean they are equally effective when it comes to PC security. An effective email client should provide your computer with another layer of protection by effectively filtering out all the unwanted email messages bound for your inbox, as well as providing some basic email attachment virus scanning.Handle email attachments carefully When you download an attachment, your computer presumes that you know what youre doing. Consequently, your firewall wont check the attachment to make sure that its safe, which leaves just a cursory scan by your email client as the only protection between an attachment and your computer. Given the low level of security surrounding attachments, its no surprise that hackers often try to hide their harmful programs in spam email attachments. In fact, an estimated 90 percent of viruses enter computers this waySuggestions: Do not open attachments from strangers, or even from well-known companies, no matter how official or familiar the email appears to be. Spammers often use very creative techniques to make their emails and their attachments look legitimate, and they are getting increasingly good at it. Presenation done by uK Mishra,Your coments will be highly Appreciable~ umakant@gmx.com
  8. 8. Do not click on email links haphazardlyA common phishing scam technique is to embed a link in an authentic-looking but fake email message which leads to a malicious website. These email messages usually try to trick people into clicking on the link and giving up personal information in order to supposedly "confirm their financial information" or even just to "unsubscribe" from a newsletter they never signed up for in the first place. Another variant on this same scheme simply installs a virus on your computer after you click on the link via a technique called drive-by downloadingSuggestions: o Do not click on links in questionable emails. Reputable companies might send an email saying theres a problem with your account, but theyll never include a link "for your convenience" proclaiming to have lost all of your data. Even if you personally follow email best practices, family members using shared email accounts may still unwittingly click on malicious links and infect your computer Presenation done by uK Mishra,Your coments will be highly Appreciable~ umakant@gmx.com
  9. 9. Set up email filtersInternet Service Providers (ISPs) are all currently developing effective spamfiltering in order to minimize the amount of spam that reaches your email client.And just as that extra level of filtering helps to reduce the levels of spam that reachyour inbox, so too you can add your own supplemental filtering level by setting upyour own personal email filters. While your ISP filter and email client filter willtogether dramatically limit the amount of spam that gets through, it is only byadding a manual filtering component through custom filtering that you can achievenear zero spam levels. Presenation done by uK Mishra,Your coments will be highly Appreciable~ umakant@gmx.com
  10. 10. Protecting Your PasswordYou would never consider setting the combination of your family safe to something as simple as, "1 … 2 … 3." But even though computer and Internet passwords provide access to far more money than your home safe, many people set themselves up to get hacked when they select passwords that are far too simple or that are changed too infrequentlyKeep hackers guessing Hackers use a variety of techniques to attempt to guess passwords. One of the most effective methods is known as "dictionary hacking" in which hackers simply run a computer program that attempts common words and number combinations.Suggestions: o Use strong passwords of at least 7 characters long, with a mix lower and uppercase letters and digits. Example: AxV37TtP0. o Never use common words or names in your password. In fact, making up new words is an effective way to keep hackers from guessing your password. o Change your passwords regularly. No matter how closely you guard your password, it will eventually become compromised. By changing your password regularly, however, you can ensure that by the time a hacker gets a hold of your password youve already changed it. Presenation done by uK Mishra,Your coments will be highly Appreciable~ umakant@gmx.com
  11. 11. Do not use a neighbors wifi connectionOften hackers setup free, seemingly unprotected wifi connections in convenientlocations such as apartment complexes and airports. While these unsecuredconnections might just be an individual who hasnt taken the time to protect hisnetwork, they might also be "honeypots", or traps set by hackers to snag yourpersonal details.Suggestions: o1.If you absolutely must use "public" wifi, make sure to encrypt and protect the data that your computer sends out. You should also encrypt your instant messages if you plan on using the service from such a vulnerable access point. o2.Never sign into financial accounts (banking, Paypal, etc) while connected to a public network. In fact, try to type in as little private information as possible when accessing the internet via any unsecured wifi connection. Presenation done by uK Mishra,Your coments will be highly Appreciable~ umakant@gmx.com
  12. 12. Be mindful of what you are clicking onMany websites that hosts harmful content will use banners and pop upadvertisements, pretending to be an error messages or offering you aprize. When you visit these sites harmful content is downloaded intoyour computer. Avoid being tempted in the first place.Be aware of what you are downloadingDont download software from a website thats full of advertisements, orlistings of free programs, these are often fake files. Be cautious andquestion them, scan them with security software prior to opening oronly download programs from reputable or corporate websites Presenation done by uK Mishra,Your coments will be highly Appreciable~ umakant@gmx.com
  13. 13. Purchase security softwareMany users are not aware that using pirated software can not protectusers computer against threats and the pirated software fromunauthorized third parties may contain viruses.Be careful before you open your removable mediaMany malicious programs attack your computers and spread via USBstorage. USB Disk Security can protect your computer against any threatsvia removable media.Update Windows when promptedMicrosoft release updates for Windows regularly. They include importantsecurity patches and tools. Install them when prompted to patch upsecurity gaps in your operating system, browser or third party software.Take extra care when using Peer-To-Peer programsSince files shared on P2P networks are not policed. Anyone can releaseanything they want via this medium. As such get into the habit ofscanning the files you downloaded before running/executing them. Presenation done by uK Mishra,Your coments will be highly Appreciable~ umakant@gmx.com
  14. 14. Accept incoming files when you expect them and from peoplethat you knowSome threats have the ability to infect machines and automatically sendcopies of themselves to that users contact list. It may appear that yourfriend is sending you a file but it may turn out to be a malicious programpropagating itself.Know your File FormatsImages usually come in .jpg .jpeg .png .bmp .gif .tif formats.Executables come in .exe .bat .com .dll formats. If someone says theyare sending you a photo but the file ends with .exe or .com, please donot open it. Theyre obviously mistaken or potentially endangering you.Be aware of whats happeningThere are various places to seek for help and learn more about yourcomputer. It pays to be knowledgeable on your computer, as maliciousthreats often take advantage of those who are unaware of whatshappening. Presenation done by uK Mishra,Your coments will be highly Appreciable~ umakant@gmx.com
  15. 15. Q&A Presenation done by uK Mishra,Your comentswill be highly Appreciable~ umakant@gmx.com
  16. 16. Thank You Presenation done by uK Mishra,Your coments will Presenation done by uK Mishra,Your coments will be highly Appreciable~ umakant@gmx.com be highly Appreciable~ umakant@gmx.com

×