Search
  • Videos
  • Windows 10
  • 5G
  • IoT
  • Cloud
  • AI
  • Security
  • more
    • TR Premium
    • Coronavirus
    • Working from Home
    • Innovation
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • Windows 10
    • 5G
    • IoT
    • Cloud
    • AI
    • Security
    • TR Premium
    • Coronavirus
    • Working from Home
    • Innovation
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet China
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

Ten basic steps to secure your PC and online accounts

1 of 10 NEXT PREV
  • Use a Password Manager

    Use a Password Manager

    Password managers help to manage the mess of creating strong, unique passwords for multiple online accounts. This helps you get around password-reuse (you know you do it!) and because they integrate directly with Web browsers, it will automatically save and fill website login forms and securely organize your life online.

    Some of the better ones include LastPass, KeePass and 1Password.

    Published: July 12, 2012 -- 15:20 GMT (08:20 PDT)

    Caption by: Ryan Naraine

  • GMail two-step authentication

    GMail two-step authentication

    We all use GMail and some of us re-use a password from another online account to lock into GMail. Not good.  It's important to turn on Google's two-step verification to make sure no one is logging into your e-mail account without your knowledge.  It's a two-factor authentication scheme that sends text-messages to your phone to verify that you are indeed trying to log into your GMail.  It takes a about 10-minutes to set up and can be found at the top of your Google Accounts Settings page.  Turn it on and set it up now. 

    Published: July 12, 2012 -- 15:20 GMT (08:20 PDT)

    Caption by: Ryan Naraine

  • Full Disk Encryption

    Full Disk Encryption

    Set up and use full disk encryption to protect your private data, especially when travelling.  Full disk encryption uses mathematical techniques to scramble data so it is unintelligible without the right key. This works independently of the policies configured in the operating system software. A different operating system or computer cannot just decide to allow access, because no computer or software can make any sense of the data without access to the right key.  

    Here's a useful primer on disk encryption and why it might be the most important investment you can make in your data. Windows users have access to Microsoft BitLocker while TrueCrypt provides the most cross-platform compatibility.

    Published: July 12, 2012 -- 15:20 GMT (08:20 PDT)

    Caption by: Ryan Naraine

  • Use Google Chrome with Force SSL

    Use Google Chrome with Force SSL

    With its strong sandbox, safe browsing tools, speedy patching and automatic/silent updating Google Chrome is considered the most secure web browser available.  Switch to Chrome and install the KB SSL Enforcer extension which will force encrypted browsing wherever possible.  The extension automatically detects if a site supports SSL (TLS) and redirects the browser session to that encrypted session.

    Published: July 12, 2012 -- 15:20 GMT (08:20 PDT)

    Caption by: Ryan Naraine

  • The importance of back-ups

    The importance of back-ups

    Get into the habit of automatically saving the contents of your machine to an external hard drive or to a secure online service. Companies like Mozy, Carbonite or iDrive can be used to back up everyone -- from files to music to photos -- or you can simply invest in an external hard drive and routinely back up all the stuff you can't afford to lose.  For Windows users, here's a cheat sheet from Microsoft.

    Published: July 12, 2012 -- 15:20 GMT (08:20 PDT)

    Caption by: Ryan Naraine

  • Uninstall Java

    Uninstall Java

    Malicious hacker attacks against Java vulnerabilities have exploded over the last two years.  If you don't absolutely need it (chances are you don't!), immediately uninstall Java from your machine.     Removing Java significantly reduces the attack surface and save you from all these annoying checked-by-default bundles that Sun tries to sneak onto your computer.

    Published: July 12, 2012 -- 15:20 GMT (08:20 PDT)

    Caption by: Ryan Naraine

  • Update Adobe Reader immediately

    Update Adobe Reader immediately

    Adobe Reader is a major target for skilled, organized hacking groups, especially those launching targeted attacks against businesses.  The newest versions --Adobe Reader and Acrobat X contains Protected Mode, a sandbox technology that serves as a major deterrent to malicious exploits. Adobe security chief Brad Arkin says the company has not yet been a single piece of malware identified that is effective against a version X install.  This is significant.  Update immediately.  If you still distrust Adobe's software, you may consider switching to an alternative product.

    Published: July 12, 2012 -- 15:20 GMT (08:20 PDT)

    Caption by: Ryan Naraine

  • Encrypt your Web traffic

    Encrypt your Web traffic

    We all check e-mails or Facebook status updates in coffee shops or on public WiFi networks.  It's important to invest in a virtual private network (VPN) to encrypt your activity and keep private data out of the hands of malicious hackers. This video explains all you need to know about the value of VPNs and how to set it up to authenticate and encrypt your web sessions.  If you use public computers, consider using a portable VPN application that can run off a USB drive.

    Published: July 12, 2012 -- 15:20 GMT (08:20 PDT)

    Caption by: Ryan Naraine

  • Social networks can be too social

    Social networks can be too social

    Popular social networks like Facebook, Twitter and LinkedIn are happy hunting grounds for cyber-criminals.  Use common sense when sharing data, even if you think you are in a trusted environment. Do not post anything sensitive or overly revealing because your privacy is never guaranteed.  Pay special attention to the security features and try to avoid clicking on strange video or links to news items that can lead to social engineering attacks.

    Published: July 12, 2012 -- 15:20 GMT (08:20 PDT)

    Caption by: Ryan Naraine

  • Patch, patch, patch

    Patch, patch, patch

    Hackers rely on security vulnerabilities as entry points into your machine.  It's important to stay on top of security patches and enable automatic updates on every piece of software where it's available. Use Windows Automatic Updates to ensure operating system patches are applied in a timely manner.  In addition, Use a reputable anti-malware product and make sure it's always fully updated.  Don't forget about security patches for third-party software products (Secunia CSI can help with this).  When installing software, go slowly and look carefully at pre-checked boxes that may add unwanted crap to your machine.  One last thing:  Go through your control panel and uninstall software that you don't or won't use.

    Published: July 12, 2012 -- 15:20 GMT (08:20 PDT)

    Caption by: Ryan Naraine

1 of 10 NEXT PREV
Ryan Naraine

By Ryan Naraine for Zero Day | July 12, 2012 -- 15:20 GMT (08:20 PDT) | Topic: Security

  • Use a Password Manager
  • GMail two-step authentication
  • Full Disk Encryption
  • Use Google Chrome with Force SSL
  • The importance of back-ups
  • Uninstall Java
  • Update Adobe Reader immediately
  • Encrypt your Web traffic
  • Social networks can be too social
  • Patch, patch, patch

The explosion of malware attacks and high-profile password and data breaches serve as confirmation that resourceful hackers are determined to break into your computer and online accounts. It's time to pay attention to these issues and follow some basic steps to stay secure while using your PC and surfing the web.

Read More Read Less

Use a Password Manager

Password managers help to manage the mess of creating strong, unique passwords for multiple online accounts. This helps you get around password-reuse (you know you do it!) and because they integrate directly with Web browsers, it will automatically save and fill website login forms and securely organize your life online.

Some of the better ones include LastPass, KeePass and 1Password.

Published: July 12, 2012 -- 15:20 GMT (08:20 PDT)

Caption by: Ryan Naraine

1 of 10 NEXT PREV

Related Topics:

Security Social Enterprise Security TV Data Management CXO Data Centers
Ryan Naraine

By Ryan Naraine for Zero Day | July 12, 2012 -- 15:20 GMT (08:20 PDT) | Topic: Security

Show Comments
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 3
  • Apricorn Aegis Secure Key 3NXC

    The new Aegis Secure Key 3NXC builds on Apricorn's Secure Key 3z and Aegis Secure Key 3NX, taking the same proven form-factor and physical keypad, and adding something that users have ...

  • YubiKey 5Ci Clear Limited Edition

    Transparency in security.

  • Certo AntiSpy iPhone Spyware Detection

    Certo AntiSpy is not an app. Instead, it is a utility that you download and install on a Windows or Mac, and you use that to scan a backup of your iOS or iPadOS for subtle signs of intrusion. ...

  • Android Smart Lock -- in pictures

    Would you like to spend less time unlocking your Android smartphone? Android has you covered.

  • Inside an encrypted external hard drive -- in pictures

    Quite a few readers have expressed an interest in seeing what's inside a super-secure DataLocker DL3 encrypted hard drive. Well, let's get the screwdrivers out and take a look! ...

  • iVerify: Added security for iPhone and iPad users

    I'm usually wary of security apps, but iVerify by Trail of Bits is different. It comes highly recommended and offers a lot of features in a small download. ...

  • DataLocker DL3 in pictures

    External hard drive featuing AES 256-bit XTS mode encryption and a built-in LCD keypad.

ZDNet
Connect with us

© 2020 CBS Interactive. All rights reserved. Privacy Policy | Cookies | Ad Choice | Advertise | Terms of Use | Mobile User Agreement

  • Topics
  • Galleries
  • Videos
  • Sponsored Narratives
  • CA Privacy/Info We Collect
  • CA Do Not Sell My Info
  • About ZDNet
  • Meet The Team
  • All Authors
  • RSS Feeds
  • Site Map
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In
  • Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums