We live in an asymmetric threat environment. This means that a wide variety of risk and the damage that can be done to a person or company is varied and largely indeterminable. Both the source and the nature of the threats that may occur are difficult to predict. You should therefore be prepared on many fronts. To protect your computer against identity thieves requires specific measures to be taken.
You may store large amounts of personal and confidential information on your computer. The idea that can get an attacker access to your private information is unacceptable. The challenge remains for you to protect your computer against loss of personally identifiable information. Fortunately, there are some steps you can take to protect your valuable information.
. 1) Choose a robust password or passphrase and prevent it to anyone. Passwords must be at least eight characters and contain at least one capital letter and one special character. Avoid the use of words commonly found in the dictionary.
. 2) Connect your workstation when you walk away. By doing this, the information on the screen will not be visible to passers-by.
. 3) Install the latest updates for all software on your computer so that identity thieves will not be able to exploit vulnerabilities and gain access to your confidential information.
. 4) purchase and use of a security software package. There are many products. Find a comparison chart and examine the possibilities. Purchase and install the one that best fills your needs. Set the program to look routinely for updates.
5.) Consider encrypting highly sensitive information on the hard drive. An unauthorized person your data might encounter difficulties in the ability to read your valuable information steals.
6.) Avoid opening e-mail attachments that may contain malware. It can, for example, installing a key logger on your computer. Key-loggers record your keystrokes (eg passwords, account numbers, etc.) and “phone home” of the confidential information to identity thieves.
. 7) Be suspicious of any attempt to request information from you via the Internet. Identity thieves are known to replicate the displays of a bank, for example. The fraudulent screen is presented to an unsuspecting computer user and he or she will be asked to provide their account numbers or passwords. Phone the office of any organization contacts you asking via the internet for private information.
. 8) Do not encrypt backups you made your critical personal information. Losing a USB or “flash” drive that contains important information would be a disaster. Who thought it could gain access to the information.
9.) Change the administrator password that is already installed on the wireless router in your home. Make it stronger. Select the highest level of encryption that you can get for your router. You could otherwise transmit confidential information in virtually any direction as far as to reach the wireless signal.
. 10) the same security Enforce best practices on mobile devices that you do for your desktop computer. Otherwise you invite identity thieves walk into your personal “data” when you log on to a public “hot spot”. Identity thieves overtime using a class of software known as “packet sniffers”. They reach out, grab the packages in which your wireless messages are coming and store up to mine for confidential information.
Identity thieves find a “target rich” environment with computer and mobile devices. Take the necessary measures to frustrate their efforts!
© Alliant Digital Services, 2011.