This web site uses cookies to improve your experience. By viewing our content, you are accepting the use of cookies. To find out more and change your cookie settings, please view our cookie policy.

Search
  • Videos
  • Smart Cities
  • Windows 10
  • Cloud
  • Innovation
  • Security
  • Tech Pro
  • more
    • ZDNet Academy
    • Microsoft
    • Mobility
    • IoT
    • Hardware
    • Executive Guides
    • Best VPN Services
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
  • Newsletters
  • All Writers
    • Log In to ZDNET
    • Join ZDNet
    • About ZDNet
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • Smart Cities
    • Windows 10
    • Cloud
    • Innovation
    • Security
    • Tech Pro
    • ZDNet Academy
    • Microsoft
    • Mobility
    • IoT
    • Hardware
    • Executive Guides
    • Best VPN Services
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
      • Log In to ZDNET
      • Join ZDNet
      • About ZDNet
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet China
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan
  • Use a Password Manager

    Use a Password Manager

    Password managers help to manage the mess of creating strong, unique passwords for multiple online accounts. This helps you get around password-reuse (you know you do it!) and because they integrate directly with Web browsers, it will automatically save and fill website login forms and securely organize your life online.

    Some of the better ones include LastPass, KeePass and 1Password.

    Published: July 12, 2012 -- 15:20 GMT (08:20 PDT)

    Caption by: Ryan Naraine

  • GMail two-step authentication

    GMail two-step authentication

    We all use GMail and some of us re-use a password from another online account to lock into GMail. Not good.  It's important to turn on Google's two-step verification to make sure no one is logging into your e-mail account without your knowledge.  It's a two-factor authentication scheme that sends text-messages to your phone to verify that you are indeed trying to log into your GMail.  It takes a about 10-minutes to set up and can be found at the top of your Google Accounts Settings page.  Turn it on and set it up now. 

    Published: July 12, 2012 -- 15:20 GMT (08:20 PDT)

    Caption by: Ryan Naraine

  • Full Disk Encryption

    Full Disk Encryption

    Set up and use full disk encryption to protect your private data, especially when travelling.  Full disk encryption uses mathematical techniques to scramble data so it is unintelligible without the right key. This works independently of the policies configured in the operating system software. A different operating system or computer cannot just decide to allow access, because no computer or software can make any sense of the data without access to the right key.  

    Here's a useful primer on disk encryption and why it might be the most important investment you can make in your data. Windows users have access to Microsoft BitLocker while TrueCrypt provides the most cross-platform compatibility.

    Published: July 12, 2012 -- 15:20 GMT (08:20 PDT)

    Caption by: Ryan Naraine

  • Use Google Chrome with Force SSL

    Use Google Chrome with Force SSL

    With its strong sandbox, safe browsing tools, speedy patching and automatic/silent updating Google Chrome is considered the most secure web browser available.  Switch to Chrome and install the KB SSL Enforcer extension which will force encrypted browsing wherever possible.  The extension automatically detects if a site supports SSL (TLS) and redirects the browser session to that encrypted session.

    Published: July 12, 2012 -- 15:20 GMT (08:20 PDT)

    Caption by: Ryan Naraine

  • The importance of back-ups

    The importance of back-ups

    Get into the habit of automatically saving the contents of your machine to an external hard drive or to a secure online service. Companies like Mozy, Carbonite or iDrive can be used to back up everyone -- from files to music to photos -- or you can simply invest in an external hard drive and routinely back up all the stuff you can't afford to lose.  For Windows users, here's a cheat sheet from Microsoft.

    Published: July 12, 2012 -- 15:20 GMT (08:20 PDT)

    Caption by: Ryan Naraine

  • Uninstall Java

    Uninstall Java

    Malicious hacker attacks against Java vulnerabilities have exploded over the last two years.  If you don't absolutely need it (chances are you don't!), immediately uninstall Java from your machine.     Removing Java significantly reduces the attack surface and save you from all these annoying checked-by-default bundles that Sun tries to sneak onto your computer.

    Published: July 12, 2012 -- 15:20 GMT (08:20 PDT)

    Caption by: Ryan Naraine

  • Update Adobe Reader immediately

    Update Adobe Reader immediately

    Adobe Reader is a major target for skilled, organized hacking groups, especially those launching targeted attacks against businesses.  The newest versions --Adobe Reader and Acrobat X contains Protected Mode, a sandbox technology that serves as a major deterrent to malicious exploits. Adobe security chief Brad Arkin says the company has not yet been a single piece of malware identified that is effective against a version X install.  This is significant.  Update immediately.  If you still distrust Adobe's software, you may consider switching to an alternative product.

    Published: July 12, 2012 -- 15:20 GMT (08:20 PDT)

    Caption by: Ryan Naraine

  • Encrypt your Web traffic

    Encrypt your Web traffic

    We all check e-mails or Facebook status updates in coffee shops or on public WiFi networks.  It's important to invest in a virtual private network (VPN) to encrypt your activity and keep private data out of the hands of malicious hackers. This video explains all you need to know about the value of VPNs and how to set it up to authenticate and encrypt your web sessions.  If you use public computers, consider using a portable VPN application that can run off a USB drive.

    Published: July 12, 2012 -- 15:20 GMT (08:20 PDT)

    Caption by: Ryan Naraine

  • Social networks can be too social

    Social networks can be too social

    Popular social networks like Facebook, Twitter and LinkedIn are happy hunting grounds for cyber-criminals.  Use common sense when sharing data, even if you think you are in a trusted environment. Do not post anything sensitive or overly revealing because your privacy is never guaranteed.  Pay special attention to the security features and try to avoid clicking on strange video or links to news items that can lead to social engineering attacks.

    Published: July 12, 2012 -- 15:20 GMT (08:20 PDT)

    Caption by: Ryan Naraine

  • Patch, patch, patch

    Patch, patch, patch

    Hackers rely on security vulnerabilities as entry points into your machine.  It's important to stay on top of security patches and enable automatic updates on every piece of software where it's available. Use Windows Automatic Updates to ensure operating system patches are applied in a timely manner.  In addition, Use a reputable anti-malware product and make sure it's always fully updated.  Don't forget about security patches for third-party software products (Secunia CSI can help with this).  When installing software, go slowly and look carefully at pre-checked boxes that may add unwanted crap to your machine.  One last thing:  Go through your control panel and uninstall software that you don't or won't use.

    Published: July 12, 2012 -- 15:20 GMT (08:20 PDT)

    Caption by: Ryan Naraine

  • 0
  • Use a Password Manager
  • GMail two-step authentication
  • Full Disk Encryption
  • Use Google Chrome with Force SSL
  • The importance of back-ups
  • Uninstall Java
  • Update Adobe Reader immediately
  • Encrypt your Web traffic
  • Social networks can be too social
  • Patch, patch, patch
10 of 10 NEXT PREV

Ten basic steps to secure your PC and online accounts

The explosion of malware attacks and high-profile password and data breaches serve as confirmation that resourceful hackers are determined to break into your computer and online accounts. It's time to pay attention to these issues and follow some basic steps to stay secure while using your PC and surfing the web.

Read More Read Less

Patch, patch, patch

Hackers rely on security vulnerabilities as entry points into your machine.  It's important to stay on top of security patches and enable automatic updates on every piece of software where it's available. Use Windows Automatic Updates to ensure operating system patches are applied in a timely manner.  In addition, Use a reputable anti-malware product and make sure it's always fully updated.  Don't forget about security patches for third-party software products (Secunia CSI can help with this).  When installing software, go slowly and look carefully at pre-checked boxes that may add unwanted crap to your machine.  One last thing:  Go through your control panel and uninstall software that you don't or won't use.

Published: July 12, 2012 -- 15:20 GMT (08:20 PDT)

Caption by: Ryan Naraine

Related Topics:

Security TV Data Management CXO Data Centers
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • Smart home suites match up devices for security and convenience

    Security

    Smart home suites match up devices for security and convenience

  • Adjust these Facebook privacy settings to protect your personal data

    Social Enterprise

    Adjust these Facebook privacy settings to protect your personal data

  • Social media cannot be trusted without these features

    Social Enterprise

    Social media cannot be trusted without these features

  • Facebook alternatives: Social apps you need to try

    Mobility

    Facebook alternatives: Social apps you need to try

ZDNet
Connect with us

© 2018 CBS Interactive. All rights reserved. Privacy Policy | Cookies | Ad Choice | Advertise | Terms of Use | Mobile User Agreement

  • Topics
  • All Authors
  • Galleries
  • Videos
  • Sponsored Narratives
  • About ZDNet
  • Meet The Team
  • Site Map
  • RSS Feeds
  • Reprint Policy
  • Manage | Log Out
  • Log In to ZDNET | Join ZDNet
  • Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy