We are currently living in an age where virtual safety is just as important as physical safety. Our smart phones have become an additional limb and our computers have the ability to run or ruin our lives. While this overstatement might seem fitting for the plot of a science fiction film, threats to our online identities are legitimate and should be taken as seriously as visiting an unfit doctor or embarking down a dark alley alone.
As the Internet has made its rapid incline we’ve experienced stolen identities, malware disguised as thoughtful, but fraudulent, virus notifications, and phishing. Worms and horses have gone from gentle animals to malicious invaders praying on user naivety and carelessness. Maintaining your computer’s security probably seems like a daunting task, however there are a few simple tips and tricks that, if kept in mind, can help any PC or Mac user stay safe when online.
PC users might have it a little bit harder than Mac aficionados, but that shouldn’t deter them from utilizing basic steps in keeping their device secure. Two notable signs of malware are pop up notifications indicating a virus has been detected and the insistence to purchase anti-virus software. Neither of these should be taken seriously other than indicators that something is trying to gain access to your computer. The best prevention includes updating the computer when necessary, using legitimate malware removal tools, and browsing reputable sites for safe downloads.
Mac users – just listen to your computer. Your device is keeping an eye out by alerting you when an opened or downloaded file could be dangerous and offers to move it to the trash if proven malicious. Apple also recommends opting for the latest updates, creating intricate passwords for accounts, and using software to encrypt your important files. Further more, using software that helps you download apps safely or utilizing iCloud to help find a lost computer ensures that your private information stays out of unwanted hands.
- Tips for mac and PC users, broad points easily accessible to “regular” people, but informative
- The field is of growing importance due to the increasing reliance on computer systems and the Internet, wireless networks such as Bluetooth and Wi-Fi, the growth of “smart” devices, including smartphones, televisions and tiny devices as part of the Internet of Things. Wikipedia, Cyber Security)
- An exploitable vulnerability is one for which at least one working attack or “exploit” exists. Vulnerabilities are often hunted or exploited with the aid of automated tools or manually using customized scripts. (“)
- Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details directly from users. Phishing is typically carried out by email spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Preying on a victim’s trust, phishing can be classified as a form of social engineering. (“)
- two animals that are a threat to cyber security on a PC are worms and Trojan horses
Your computer is infected!
This computer is infected by spyware and adware.
Note If you receive a message in a popup dialog box that resembles this warning, press ALT + F4 on your keyboard to close the dialog box. Do not click anything inside the dialog box. If a warning, such as the one here, keeps appearing when you try to close the dialog box, it’s a good indication that the message is malicious.
- Are you sure you want to navigate from this page?
Your computer is infected! They can cause data lost and file corruption and need to be treated as soon as possible. Press CANCEL to prevent it. Return to System Security and download it to secure your PC.
Press OK to Continue or Cancel to stay on the current page.
If you see this kind of message, then don’t download or buy the software.
- Removing a computer virus or spyware can be difficult without the help of malicious software removal tools. Some computer viruses and other unwanted software reinstall themselves after the viruses and spyware are detected and removed. Fortunately, by updating the computer and by using malicious software removal tools, you can help permanently remove unwanted software.
- Doing the newest updates
- Downloading apps safely
- Encryption for your files
- Privacy controls in system preferences
- Good password
- Listen to your mac, it’s keeping an eye out
- Turn on a firewall to prevent other machines from accessing services running on your Mac.
- Control access to your Mac by locking your screen after a period of inactivity.
- Set up secure file sharing.
- Use Password Assistant to create stronger passwords for local utilities like Users & Groups.
- Make sure you’re only running sharing services that you really need.