PC security can be so simple. Those who follow the following 10 Golden Rules can protect themselves from the most common threats.
1. Periodically create a backup
Note: There should be a few surprises for experienced PC users - but our comprehensibly formulated 10 rules for PC security are perfect to bring beginners and less technically experienced family members, friends and acquaintances up to date. We are happy to share this article - we are looking forward to any "PC-Drama" which has been used this way.
2. Install a common security
This is the most boring, but ultimately most important rule for the security of your data. They can never protect themselves one hundred percent from trojans and hard disk crashes. With a backup your data will not be lost.
3. Update Windows and all other programs
The common security systems all offer a high level of protection in all the security areas of your computer. They protect against attacks from the web, from e-mails or USB sticks.
4. Use secure passwords everywhere
Lesetipp: The best anti-virus programs 2017 in the comparison test
Since almost all programs are connected to the network, all of them also contain security gaps. These are only fixed by updates.
The more important you are to an account, the more secure the password should be - depending on how the loss of the account would be.
In Windows you should never work with the admin account or even surf. Create a simple account right from the start and get used to working with it in your everyday life.
The Haupeinfall gate for pests is the web. Malicious pages (or malicious banners on benign pages) install trojans through gaps in browsers and their plugins.
Any USB stick and any USB drive can transfer viruses and Trojans to your PC. So be cautious and do not connect any stick that someone can offer you (for example, at a trade show with more info). A popular transhipment site for viruses are e.g. Photoautomaten, where many user sticks connect. In the machines often runs XP.
The same as for external devices also applies to foreign files. Most files can potentially cause damage, although the risk is far greater for executable files. This includes not only exe files, but also scripts embedded in other documents, especially office macros.
Lesetipp: Avoid Locky infection: Settings for Outlook, Word & Co.
Your router is a central point of attack on your home network, if an attacker has set up here, he can largely control your network and all devices unintentionally. You should protect the router particularly well. This starts with a very secure password for the web interface (20 random characters, for example, with Keepass generated), and ends with firmware updates
5. Create a user account for yourself
Lesetipp: Ensure WLAN router securely: 7 Tips
If your laptop is part of a strange or - even worse - open WLAN, you should pay particular attention. They are located in the same network segment with all computers, so many security mechanisms do not work.
6. Caution with browser scripts and plugins
7. Be careful with foreign devices
8. Be careful with foreign data
9. Secure your router against hacker attacks
10. Be careful in foreign networks
Lesetipp
No comments:
Post a Comment