Search
  • Videos
  • Windows 10
  • 5G
  • Best VPNs
  • Cloud
  • Security
  • AI
  • more
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • Windows 10
    • 5G
    • Best VPNs
    • Cloud
    • Security
    • AI
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

How to secure your computer and online accounts in 10 simple steps

1 of 10 NEXT PREV
  • 1. Set a strong password, and use a password manager

    1. Set a strong password, and use a password manager

    A secure password can be the death knell to a hacker trying to gain access to your PC or your online account. Pick something memorable, but also complicated and unique. But using that password again and again for multiple accounts, no matter how strong it can be, can open you up to other attacks. If one account is breached, that means others could be too. Using a password manager like LastPass and 1Password can help eliminate passwords that you reuse, while mitigating other attacks, like keyloggers.

    Security

    • Google: Bad bots are on the attack, and your defence plan is probably wrong
    • Cyber security 101: Protect your privacy from hackers, spies, and the government
    • The best antivirus software and apps
    • The best VPNs for business and home use
    • The best security keys for two-factor authentication
    • How a hacker attempted to poison a city's water supply (ZDNet YouTube)
    Published: January 15, 2016 -- 13:31 GMT (05:31 PST)

    Photo by: ZDNet/CBS Interactive

    Caption by: Zack Whittaker

  • 2. Remove bundled crapware and bloatware

    2. Remove bundled crapware and bloatware

    Even with a brand new Windows PC, do you really know what's on it? Removing software and apps that are preinstalled with your new computer can help improve your security. After Lenovo was found to have installed a covert tracking tool and broke encryption on new computers, it sparked a new wave of hatred for pre-installed junk software. Removing these apps and pseudo-antivirus programs (which more often than not want you to pay for them) can cut down on how many points of attack a hacker or malware can get you from.

    Security

    • Google: Bad bots are on the attack, and your defence plan is probably wrong
    • Cyber security 101: Protect your privacy from hackers, spies, and the government
    • The best antivirus software and apps
    • The best VPNs for business and home use
    • The best security keys for two-factor authentication
    • How a hacker attempted to poison a city's water supply (ZDNet YouTube)
    Published: January 15, 2016 -- 13:31 GMT (05:31 PST)

    Caption by: Zack Whittaker

  • 3. Setup two-factor authentication on your online accounts

    3. Setup two-factor authentication on your online accounts

    Two-factor authentication works by sending a second password or code to a device you own and trust, like your phone. Setting it up bolsters your password considerably, and makes it far more difficult for someone to access your account. Most online accounts now support two-factor authentication, including Apple, Google, Facebook, Microsoft, and Yahoo. It takes only a few minutes to set up.

    Security

    • Google: Bad bots are on the attack, and your defence plan is probably wrong
    • Cyber security 101: Protect your privacy from hackers, spies, and the government
    • The best antivirus software and apps
    • The best VPNs for business and home use
    • The best security keys for two-factor authentication
    • How a hacker attempted to poison a city's water supply (ZDNet YouTube)
    Published: January 15, 2016 -- 13:31 GMT (05:31 PST)

    Photo by: ZDNet/CBS Interactive

    Caption by: Zack Whittaker

  • 4. Enable full-disk encryption

    4. Enable full-disk encryption

    Setting up encryption on your hard drives is relatively straight-forward with most tools, and could save your private data from ending up in the wrong hands. Without the right password, your data is scrambled and unreadable.

    Something open-source like TrueCrypt is best while TrueCrypt itself is off the table because it's no longer in development (though a recent audit said it's still essentially trustworthy). There are offshoot alternatives, like VeraCrypt, that are said to be the next-best thing. Or Microsoft's BitLocker or Apple's FileVault are good built-in solutions -- but while they may keep hackers away, they won't deter the US government.

    Security

    • Google: Bad bots are on the attack, and your defence plan is probably wrong
    • Cyber security 101: Protect your privacy from hackers, spies, and the government
    • The best antivirus software and apps
    • The best VPNs for business and home use
    • The best security keys for two-factor authentication
    • How a hacker attempted to poison a city's water supply (ZDNet YouTube)
    Published: January 15, 2016 -- 13:31 GMT (05:31 PST)

    Caption by: Zack Whittaker

  • 5. Use HTTPS Everywhere plugin for Firefox, Chrome browsers

    5. Use HTTPS Everywhere plugin for Firefox, Chrome browsers

    Forcing a secure connection to a website can help protect your privacy and help you stay secure. Adding a plugin called HTTPS Everywhere in your Mozilla Firefox or Google Chrome browser forces a website to load up using a secure version of the page (if available).

    It's created by the Electronic Frontier Foundation, a privacy group, so you know it can be trusted. (Firefox and Chrome also come with an auto-update feature, so they will always be up-to-date with the latest security features and fixes.)

    Security

    • Google: Bad bots are on the attack, and your defence plan is probably wrong
    • Cyber security 101: Protect your privacy from hackers, spies, and the government
    • The best antivirus software and apps
    • The best VPNs for business and home use
    • The best security keys for two-factor authentication
    • How a hacker attempted to poison a city's water supply (ZDNet YouTube)
    Published: January 15, 2016 -- 13:31 GMT (05:31 PST)

    Photo by: ZDNet/CBS Interactive

    Caption by: Zack Whittaker

  • 6. Uninstall Java, and lock down Adobe plugins

    6. Uninstall Java, and lock down Adobe plugins

    Java. The bane of most IT professional's existence. Most websites don't use the plugin, instead opting for modern Web standards. Java is renowned for being riddled with bugs and security issues. Homeland Security has previously warned users about using the software. Simply disable and uninstall it if you know you don't need it.

    Meanwhile, apps like Adobe Flash and Adobe Reader are also known to be troublesome, but are still widely used. Your best bet is to make them update automatically in the background. There's advice on how to do this for both Flash and Reader.

    Security

    • Google: Bad bots are on the attack, and your defence plan is probably wrong
    • Cyber security 101: Protect your privacy from hackers, spies, and the government
    • The best antivirus software and apps
    • The best VPNs for business and home use
    • The best security keys for two-factor authentication
    • How a hacker attempted to poison a city's water supply (ZDNet YouTube)
    Published: January 15, 2016 -- 13:31 GMT (05:31 PST)

    Photo by: ZDNet/CBS Interactive

    Caption by: Zack Whittaker

  • 7. Use Tor for anonymous browsing

    7. Use Tor for anonymous browsing

    Tor, known as the anonymity network, scrambles a user's identity and makes browsing history unreadable to the outside malicious actor (or intelligence agency). In fact, even the National Security Agency had considerable trouble in gaining access to so-called "dark web" data. Using Tor can significantly help your privacy needs. It's not infallible, and there are always people trying to crack it. But it's one of, if not the best browsing masker available today.

    Security

    • Google: Bad bots are on the attack, and your defence plan is probably wrong
    • Cyber security 101: Protect your privacy from hackers, spies, and the government
    • The best antivirus software and apps
    • The best VPNs for business and home use
    • The best security keys for two-factor authentication
    • How a hacker attempted to poison a city's water supply (ZDNet YouTube)
    Published: January 15, 2016 -- 13:31 GMT (05:31 PST)

    Photo by: ZDNet/CBS Interactive

    Caption by: Zack Whittaker

  • 8. Keep your machine patched and up-to-date

    8. Keep your machine patched and up-to-date

    Making sure that your operating system is up-to-date is vital to your computer's security. Without your knowledge, malware can be installed on unpatched computers forcing them to enroll in criminal activity without your knowledge. Known as "botnets," they can steal data and bring down other networks by overloading them with traffic. Keeping your computer (even your Mac) up to date can keep malware and botnets at bay.

    Security

    • Google: Bad bots are on the attack, and your defence plan is probably wrong
    • Cyber security 101: Protect your privacy from hackers, spies, and the government
    • The best antivirus software and apps
    • The best VPNs for business and home use
    • The best security keys for two-factor authentication
    • How a hacker attempted to poison a city's water supply (ZDNet YouTube)
    Published: January 15, 2016 -- 13:31 GMT (05:31 PST)

    Photo by: ZDNet/CBS Interactive

    Caption by: Zack Whittaker

  • 9. Use an ad-blocker

    9. Use an ad-blocker

    Installing an ad-blocker to your browser, like Apple Safari, Mozilla Firefox or Google Chrome, can help significantly reduce the number of tracking cookies that get installed on your computer. A number of ad-blockers exist, but one of the best up-and-coming plugins is called uBlock. It's also open-source, so other developers can inspect the code.

    Security

    • Google: Bad bots are on the attack, and your defence plan is probably wrong
    • Cyber security 101: Protect your privacy from hackers, spies, and the government
    • The best antivirus software and apps
    • The best VPNs for business and home use
    • The best security keys for two-factor authentication
    • How a hacker attempted to poison a city's water supply (ZDNet YouTube)
    Published: January 15, 2016 -- 13:31 GMT (05:31 PST)

    Photo by: ZDNet/CBS Interactive

    Caption by: Zack Whittaker

  • 10. Use a virtual private network for public Wi-Fi use

    10. Use a virtual private network for public Wi-Fi use

    Adding a virtual private networking option to your computer can help bolster the poor security on open, public Wi-Fi networks. Adding a free service like Hotspot Shield to your computer funnels your traffic through an encrypted pipeline so potentially malicious actors on the same Wi-Fi network can't access your data. The downside is that your speeds may slow slightly. Other services like OpenDNS, which adds an extra layer of security to your browsing, can also filter out some of the more nefarious and malicious sites.

    Security

    • Google: Bad bots are on the attack, and your defence plan is probably wrong
    • Cyber security 101: Protect your privacy from hackers, spies, and the government
    • The best antivirus software and apps
    • The best VPNs for business and home use
    • The best security keys for two-factor authentication
    • How a hacker attempted to poison a city's water supply (ZDNet YouTube)
    Published: January 15, 2016 -- 13:31 GMT (05:31 PST)

    Photo by: ZDNet/CBS Interactive

    Caption by: Zack Whittaker

1 of 10 NEXT PREV
Zack Whittaker

By Zack Whittaker for Zero Day | January 15, 2016 -- 13:31 GMT (05:31 PST) | Topic: Storage

  • 1. Set a strong password, and use a password manager
  • 2. Remove bundled crapware and bloatware
  • 3. Setup two-factor authentication on your online accounts
  • 4. Enable full-disk encryption
  • 5. Use HTTPS Everywhere plugin for Firefox, Chrome browsers
  • 6. Uninstall Java, and lock down Adobe plugins
  • 7. Use Tor for anonymous browsing
  • 8. Keep your machine patched and up-to-date
  • 9. Use an ad-blocker
  • 10. Use a virtual private network for public Wi-Fi use

Data breaches, hacks, and vulnerable software makes it easier than ever for a hacker to get access to your data. These simple steps can help mitigate it happening in the first place.

Read More Read Less

1. Set a strong password, and use a password manager

A secure password can be the death knell to a hacker trying to gain access to your PC or your online account. Pick something memorable, but also complicated and unique. But using that password again and again for multiple accounts, no matter how strong it can be, can open you up to other attacks. If one account is breached, that means others could be too. Using a password manager like LastPass and 1Password can help eliminate passwords that you reuse, while mitigating other attacks, like keyloggers.

Security

  • Google: Bad bots are on the attack, and your defence plan is probably wrong
  • Cyber security 101: Protect your privacy from hackers, spies, and the government
  • The best antivirus software and apps
  • The best VPNs for business and home use
  • The best security keys for two-factor authentication
  • How a hacker attempted to poison a city's water supply (ZDNet YouTube)
Published: January 15, 2016 -- 13:31 GMT (05:31 PST)

Caption by: Zack Whittaker

1 of 10 NEXT PREV

Related Topics:

Storage Apple Hardware Reviews Mobility Data Centers
Zack Whittaker

By Zack Whittaker for Zero Day | January 15, 2016 -- 13:31 GMT (05:31 PST) | Topic: Storage

Show Comments
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 3
  • OWC Envoy Pro FX external SSD

    High-speed external drive capable of to 2800MB/s, IP67 rated, and drop-tested to MIL-STD810G.

  • OWC U2 Shuttle for 3.5-inch drive bay

    Fit up to four NVMe M.2 SSDs into a swappable, high capacity, flexible, and RAID-ready storage module.

  • Fake microSD card

    Typical of fake microSD cards -- low-quality, low-capacity cards reprogrammed to give the impression they are bigger, and a bit of nasty screen print added on top. ...

  • iStorage datAshur BT hardware encrypted flash drive

    FIPS 140-2 Level 3 compliant storage drive with wireless unlock feature and remote management. IP57 rated for dust and water resistance.

  • Samsung 980 PRO

    The 980 PRO offers sequential read and write speeds of up to 7,000 MB/s and 5,000 MB/s respectively, along with random read and write speeds of up to 1,000K IOP. ...

  • SanDisk 256GB Ultra Dual USB-C/USB-A flash drive

    This flash drive is small, versatile, reliable, tough (it's been rattling on my keys for weeks and it's pretty much like new), and at $35 for 256GB, it's very cheap. ...

  • RAVPower iPhone Flash Drive

    The RAVPower iPhone Flash Drive is an MFi Certified USB 3.0 flash drive that allows you to access the data on the drive and charge your iPhone simultaneously. ...

ZDNet
Connect with us

© 2021 ZDNET, A RED VENTURES COMPANY. ALL RIGHTS RESERVED. Privacy Policy | Cookie Settings | Advertise | Terms of Use

  • Topics
  • Galleries
  • Videos
  • Sponsored Narratives
  • Do Not Sell My Information
  • About ZDNet
  • Meet The Team
  • All Authors
  • RSS Feeds
  • Site Map
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In
  • Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums