Computer security is layered with different components and many different approaches. One can take security to the extreme, and do their best to block out the world at the expense of speed. Others will do nothing, and act like it really doesn't matter, and no matter what they have it under control. At pcmd we take the middle of the road approach by utilizing good basic protections with minimal effect on computer performance, and internet browsing.
Everyone has a different opinion on personal privacy. Some like the spot light while others like to hide out in the dark. There is no right or wrong way to look at computer security as long as one implements the most basic protections available. What does most basic protections mean you may ask? Well, for starters using the computer responsibly and surfing the web smartly goes along way. Beyond that we recommend a wireless router that has a built in firewall and to have some sort of anti-virus program running and keeping it up to date. Some claim to get by with no anti-virus or malware tools, and they may be able too, but as time goes by that approach will become harder and harder.
Studies and hacked password lists have shown that most users do not use strong passwords, they tend to use the same password for everything. Ask them to change it and instant frustration, and feelings of anger over their future failure to remember the new password sets in. Passwords are a part of life on the web and strong passwords are more than a good idea, they are a necessity. Strong passwords that are not used on more than one site are required in order to protect one from random online attacks. So, what is a strong password? A strong password is a password that does not use dictionary words of any kind. A strong password has a varied input like capitols, numbers, and punctuation. A strong password is also reasonably long, say at least eight or more characters. PCMD recommends you use password generators to create the password and the use of password management program programs such as Lastpass, Dashlane, or one of the many others. By utilizing password management software one can create passwords that meet the maximum length allowed by each individual website which can make it very hard to crack, or at least take a lifetime. A thief will always go for the easy low hanging fruit, therefore the use of a truly strong password will keep one in a much better position than the person who uses their dog or cats name.
Over the years many different types hardware and tools have become available for people to secure there computers. Businesses have different demands than the consumer does, but most small businesses do not need to spend the extra money acquiring business grade hardware. Yet, all computer users should not be directly connected to the internet with just a modem. Connecting the modem to a wireless router that has a firewall is the simplest way to get basic protection. If you must have direct access to the internet a wireless router can be configured to allow a computer to directly access the internet, it is referred to as the DMZ but generally this is not advised.
By installing some common and very popular software you are opening the doors to many different problems. Most but not all software manufactures release updates that are in response to security flaws they have become aware of. Sometimes manufactures may never fix them, or it could be years before these problems are fixed or discovered leaving everyone vulnerable to attack. If you use programs that have an automatic update feature be sure it is running. Therefore, the program will automatically install updates as soon as they come out. As long as you allow them too.
A good example of programs with security flaws is Java. Which seems to need to be updated all the time. The more recent versions of Java will remove the previously installed version(s) automatically, which is nice. However, it only goes so far back, so any versions not automatically uninstalled will need to be uninstalled manually. These older versions can cause odd little troubles, or slow downs that seem to go away once Java is removed.
PCMD recommends you uninstall all older versions of Java unless a particular version is required for either software or hardware support. If you do not know if you require a certain version of Java, odds are good that you do not. Most versions of Java are available for download if you make a mistake and uninstall the wrong version. In fact most users don't need Java or actually use it, manufactures make money including other manufactures software so, end users are left thinking they need to use Java, even though they don't know why.
Another example is Adobe Flash, that is used for many different things from complete websites, banner ads, and simple things like flashing or scrolling text. Over the years Flash has become very controversial, and one big reason is due to Apple not supporting it with their products. Many websites use it to add flare to their sites, and some are fully built upon it, but it is a security risk that must be acknowledged. Due to its popularity viruses and malware writers use it to distribute their payloads, so it is important to keep it up to date. With the advent of HTML5 (Hyper Text Markup Language) Flash will eventually not be used or needed. Until then keep Flash up to date, or uninstall it.
On taskbar located at the right bottom corner of your screen is the notifications area. This is where most programs let you know of updates and other things that are happening. It is important not to turn off certain notifications like Windows updates or Java updates. In certain situations where an update can cause issues with the program, then definitely turn automatic updates off.
Malware can and will turn off notifications for you, or malware can take over an applications notification and display a new one that looks very similar. Learn what your product icons look like, so you know if they change. PCMD recommends regularly checking your taskbar for application updates or changes to icon appearance. More often than not when pcmd is called to repair a computer there is a build up of updates. Many people are concerned that they are phonies, and do not install them. However, leaving your computer at risk of attack is just as bad. Keep an eye on the taskbar and do not ignore pop ups, or icon changes.
Hackers can be anywhere.