Five Tips For Safe Computer Use

 With the exponential growth of social networking and the risks that arise from living one's life online, it's important for every web user to take steps to minimize those risks.

Panda Security recommends that users take this opportunity to adopt the following habits to keep their computers safe from malware and other threats: 

1. Use an Anti-virus: Despite growing awareness of today's Web-borne threats, many people still don't use even a basic antivirus solution on their computers, leaving themselves vulnerable to infection, data loss, and identity theft. If you already have an anti-virus, remember that it's equally important to keep it updated so your computer stays protected from the latest threats.

2. Update Your Computer: It's easy to ignore those pop-up notifications asking you to update your operating system and applications, but those patches and security fixes are vital to eliminating vulnerabilities that can be exploited by cybercriminals. Restarting the computer takes a lot less time than eliminating a malicious Trojan or rootkit.

3. Routinely Scan your System and Connected Devices: Today's threats can be here today and gone tomorrow, only to be replaced by some other epidemic. So it only makes sense to scan your computer daily -- and don't forget to scan all those other storage-enabled devices -- like USB drives -- that you connect to your computer … they're all capable of spreading infections. Most anti-malware products have a way to set up a daily scan that runs automatically, so take five minutes to set it up. You won't regret it.

4. Strengthen and Change Passwords: Even amateur cyber criminals can gain access to private account information if they can persuade you to hand over your password. If you're not sure a site or email is genuine, don't hand over your password! Make a phone call to check out the request. Maximize password security by combining upper/lowercase letters, numbers and symbols. Avoid expected combinations like birthdays and addresses, and change passwords every three months.

5. Securing your business interests: If you are a business owner, the risks of not keeping your computers protected are substantial and can result in lost revenues as well as minimize employee productivity. Secure business networks and sensitive data by investing in solutions that protect all threat vectors: endpoints, e-mail and the Web. Also remember that sources of computer infections are changing rapidly, and security practices have to be adjusted appropriately; Panda Security's recent Social Media Risk Index survey found that 33 percent of small to medium-sized businesses (SMBs) have been infected by malware propagated via social networks. The report provides many more tips for keeping your business secure.

"Cyber security is something everyone should be thinking about whenever they log on to email or fire up their browser," said Sean-Paul Correll, threat researcher for PandaLabs, the malware analysis and detection laboratory for Panda Security. "Hackers and other cyber criminals are constantly coming up with new ways to exploit vulnerabilities, fool users, and steal data, so Cyber Security Awareness Month is the ideal time to revisit our own security awareness and take the necessary steps to stay safe online."

Featured

  • 12 Commercial Crime Sites to Do Your Research

    12 Commercial Crime Sites to Do Your Research

    Understanding crime statistics in your industry and area is crucial for making important decisions about your security budget. With so much information out there, how can you know which statistics to trust? Read Now

  • Boosting Safety and Efficiency

    Boosting Safety and Efficiency

    In alignment with the state of Mississippi’s mission of “Empowering Mississippi citizens to stay connected and engaged with their government,” Salient's CompleteView VMS is being installed throughout more than 150 state boards, commissions and agencies in order to ensure safety for thousands of constituents who access state services daily. Read Now

  • Live From GSX: Post-Show Review

    Live From GSX: Post-Show Review

    This year’s Live From GSX program was a rousing success! Again, we’d like to thank our partners, and IPVideo, for working with us and letting us broadcast their solutions to the industry. You can follow our Live From GSX 2023 page to keep up with post-show developments and announcements. And if you’re interested in working with us in 2024, please don’t hesitate to ask about our Live From programs for ISC West in March or next year’s GSX. Read Now

    • Industry Events
    • GSX
  • People Say the Funniest Things

    People Say the Funniest Things

    By all accounts, GSX version 2023 was completely successful. Apparently, there were plenty of mix-ups with the airlines and getting aircraft from the East Coast into Big D. I am all ears when I am in a gathering of people. You never know when a nugget of information might flip out. Read Now

    • Industry Events
    • GSX

Featured Cybersecurity

Webinars

New Products

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3