Teaser

6/recent/ticker-posts

The Ultimate Guide to Comprehensive Network Security for Your Business


 

The Ultimate Guide to Comprehensive Network Security for Your Business

                                                   Part -1 Desktop Security 


 keywords: Desktop security, endpoint security, antivirus, malware protection, intrusion prevention, firewalls, encryption, access control, user education, network security, incident response, patch management.


Why do you need to secure your Desktop/Laptop?


A personal computer used without proper security measures could lead to exploiting the system for illegal activities using the resources of such in-secured computers. These exploiters could be viruses, Trojans, Key loggers, and sometimes real hackers. This may result in data theft, data loss, personal information disclosure, stealing of credentials like passwords, etc. So, protect and secure your Personal Computer before it is compromised.

Physical security measures for Desktop/Laptop

  • Regularly clean your system and its components.

  • Note: Turn your PC Off before cleaning it.

  • Properly organize the power cables, and wires, to prevent water, insects, etc.

  • While working on the PC, be careful not to spill water or food items on it.

  • Always follow the “Safely Remove” option provided by the Operating System while

  • disconnecting the USB devices.

  • By setting a BIOS password, you can prevent unauthorized access to your personal computer.

  • Switch off the computer when it’s not in use.

 

Data Security measures for Desktop/Laptop

Data security refers to the protection of data from unauthorized access, use,  change, disclosure, and destruction. There are different types of data security measures such as data backup, encryption, and antivirus software, which will ensure the security of your sensitive data. 

  • Enable Auto-updates of your Operating System and update it regularly.

  • Download Anti-Virus Software from a Trusted Website and Install it. Make sure it automatically gets updated with the latest virus signatures.

  • Download Anti-Spyware Software from a Trusted Website and Install it. Make sure it automatically updates with the latest definitions.

  • Use “Encryption” to secure your valuable Information.

Note: For encryption password is required, always remember the password used while encrypting it, or else data would not be available thereafter.

Data Security measures for Desktop/Laptop...

  • Strong passwords should be used for the “Admin” Account on a computer and for other important applications like email clients, Financial Applications (accounting, etc).

  • Backup: Periodically backup your computer data on CD / DVD or USB drive etc.. in case it may get corrupted due to HardDisk failures or when reinstalling/formatting the system.

  • Recovery Disk: Always keep the recovery disk supplied by the Manufacturer / Vendor of the Computer System to recover the Operating System in the event of boot failures due to system changes such as uncertificated Drivers/unknown Software publishers.

  • Startup programs should be monitored/controlled for optimal system performance.

Browser Security measures for Desktop/Laptop

Today, web browsers such as Microsoft Internet Explorer, Mozilla Firefox, and Apple Safari are installed on almost all computers. Because web browsers are used so frequently, it is vital to configure them securely. Often, the web browser that comes with an operating system is not set up in a secure default configuration. Not securing your web browser can lead quickly to a variety of computer problems caused by anything from spyware being installed without your knowledge to intruders taking control of your computer.

  • Always update your Web Browser with the latest patches.

  • Use privacy or security settings that are inbuilt into the browser.

  • Also use content filtering software.

  • Always have Safe Search “ON” in Search Engine.

eMail Security measures for Desktop/Laptop

Email security is about protecting sensitive information in email communication and accounts to secure against unauthorized access, loss, or compromise. Email is often used to spread malware, spam, and phishing attacks. Scammers fraudulently entice recipients to part with sensitive information, open attachments, or click on hyperlinks that install malware on the victim’s device.

  • Always use a strong password for your email account.

  • Always use Anti-Spyware Software to scan emails for Spam.

  • Always scan the e-Mail attachments with the latest updated Anti-Virus and Anti-Spy ware before opening.

  • Always remember to empty the Spam folder.

How to encrypt a file?

File encryption helps protect your data by encrypting it. Only someone with the right encryption key (such as a password) can decrypt it. File encryption is not available in Windows 10 Home.

  • Right-click (or press and hold) a file or folder and select Properties.

  • Select the Advanced button and select the Encrypt contents to secure data check box.

  • Select OK to close the Advanced Attributes window, select Apply, and then select OK.

Password-protecting a zipped file:

This is a good solution if your version of Windows does not support password protection. If you put the files you would like to protect in a zip file, you can then apply a password.

  • In Windows Explorer, highlight and right-click on the files you would like to put into a zipped file.

  • Select  Send to, then Zip folder (compressed). Follow the prompts to name and save the folder.

  • Double-click the zipped file, then select File and Add Password.

  • Fill out the requested information, then click Apply.

Wireless Security measures for Desktop/Laptop

Wireless security is the prevention of unauthorized access or damage to computers or data using wireless networks, which include Wi-Fi Networks. wireless networking is prone to some security issues.  cybercriminals have found wireless networks relatively easy to break into, and even use wireless technology to hack into wired networks. As a result, it is very important that one must use wireless security measures to safeguard against unauthorized access to important resources.

  • Change default Administrator passwords.

  • Turn On WPA (Wi-Fi Protected Access) / WEP Encryption.

  • Change default SSID.

  • Enable MAC address filtering.

  • Turn off your wireless network when not in use.

Modem Security measures for Desktop/Laptop

  • Change the default passwords.

  • Switch off when not in use.

  • The best way to protect a router from malicious software is not to turn it off when it is not in use, but to secure it with a strong password.


How to connect a Wireless Modem to a Desktop Computer…

Instructions to be followed while connecting the Wireless Modem

  1. Make sure you have the necessary equipment. Your wireless modem package should

include the wireless modem (or wireless adapter); an installation CD-ROM with a manual; an Ethernet cable (or a USB cable if you have a wireless USB modem); a wireless antenna (conforming to wireless standards such as 802.11a, 802.11b, or 802.11g); and a power adapter. Call the retailer or the manufacturer of your wireless modem if any of these items are missing.

  1. Read the manual to learn how the equipment functions. For example, use the wireless antenna to connect to the wireless network; use the Ethernet cable (or USB cable) to connect the computer to the modem.

  2. Attach your wireless antenna to the modem.

  3. Hook up an Ethernet cable from your computer to a LAN/Ethernet port on the modem. Or, if you have a wireless USB modem, connect the USB cable to the USB port of the computer.

  4. Connect the power adapter to the power connector of the modem, plug it in and switch it on.

 

Setting Up the Wireless Modem

  • Open your Web browser and enter the URL of the modem’s administrative site. If you can’t find it in the user’s manual, call the modem manufacturer’s/vendor’s customer service.

  • Log in to the administrative site by entering the user name and password provided in the user manual. Again, if you cannot locate these, call the modem manufacturer’s/vendor’s customer service. Usually, the default username and password are “Admin.”

  • Select the Internet connection type. There are four types of Internet connection: “Dynamic IP Address,” “Static IP Address,” “PPPoE/PPPoA” and “Bridge Mode.” Call your Internet service provider (ISP) to ask which setting best suits their wireless service.

  • Choose “Dynamic IP Address” to get an IP address automatically from the ISP’s server. For every wireless Internet connection you make, you receive an IP address. In some cases the IP address is dynamic (it changes every time you connect to the Internet), and in other cases it is static (the IP address remains the same even after you disconnect and reconnect to the Internet). If the address is dynamic, you will have to choose this setting so that the modem automatically takes the IP from the ISP’s server whenever a new wireless connection is established. Enter your modem’s MAC Address (usually found at the back of the modem) and other details. Refer to the user manual or call the modem manufacturer’s / vendor’s custom- -er service to get these details

Setting Up the Wireless Modem

  • Select “Static IP Address” if you are provided with a static IP. You will need to fill in the fields for “VPI,” “VCI,” “IP Address,” “Subnet Mask,” “ISP Gateway Address,” “Server Address,” “Primary DNS Address,” “Secondary DNS Address” and “Connection Type.” These details can be obtained from your ISP.

  • Opt for “PPPoE/PPPoA” if your ISP uses this type of connection. DSL users may use this connection. Enter your username, password, and other details. These will be provided by your ISP.

  • Select the “Bridge Mode” if your ISP uses this connection type. Enter the relevant details provided by your ISP.

  • Finish the process by clicking on the icon that says “Finish” or “OK” or something similar. Your modem should be set up now.

  • Enter any URL address in your browser’s address window to check whether the Internet is com- -m ing or not.

 

Ergonomics of Desktop/laptop use

It is necessary to take care of ergonomic aspects while arranging digital devices for use at home or office and also knows about their relevance and importance, in reducing the stress and strain on the physical body thereby avoiding injuries due to repeated usage.

Here are several helpful computer ergonomics tips:

  • Sit so your head and neck are upright and in line with your torso, not bent down or tilted back.

  • Face your computer screen directly. Avoid viewing your screen with your head turned or your back twisted.

  • Keep your elbows comfortably close to your body.

  • Use a chair that provides support for your lower back and has a cushioned seat with a contoured front edge.

  • Keep your mouse close to your keyboard so you don't have to reach for it.

 

Here are several helpful computer ergonomics tips:

  • Position your computer display so the top of the screen is at or slightly below eye level. This will allow you to view the screen without bending your neck.

  • Adjust the position of your display to prevent reflections of overhead and outdoor lighting from appearing on your screen.

  • Put your monitor close enough to your eyes so you can comfortably read text on the screen without leaning forward.

  • Angle the laptop screen back so you can see it with the least amount of neck deviation possible

  • For relaxing your eyes when looking at device screens follow the 20-20-20 rule, which is for every 20 minutes of time spent looking at the screen, take a 20-second break, and look at something that is 20 feet away.


Hygienic practices while using a Desktop/Laptop

  • Use a Screen guard and protective covers for your laptop/desktop.

  • Ensure that the laptop is properly charged before use.

  • Avoid overcharging as it decreases battery life and may cause a fire in a few cases. It is advisable to charge a device when its charge is 50% or low and not charge up to or beyond 100%. (shallow discharges and recharges put less stress on the battery)

  • Do not use chargers that do not suit your desktop/laptop.

  • Use padded bags for laptops while traveling to prevent damage.

  • Do not expose your desktop/laptop to extreme temperatures and keep them away from wet places.

  • Always log off the computer when you are away from your computer.

  • Shut down your laptop before putting them in the bag as it may cause overheating.

Useful tips on cleaning your digital devices in case of spillage 

  • While cleaning your digital device never spray the liquids directly on the device, instead use a soft or microfiber cloth dip it in the cleaning solution and clean it gently.

  • In case you accidentally spill something on your desktop/laptop, switch it off immediately and remove the battery and other accessories attached to it, position your device in a way that the liquid runs out, and then wipe with a soft cloth and let it dry (do not use a hair dryer or vacuum cleaners). If need be take it to repair shop. Remember that opening up the computer case and trying to dry internal parts can not only damage it further but also make any warranty null.

  • It is advisable that once in a while you have your desktop/laptop checked at an authorized service center.

How to safely dispose of your Desktop/Laptop

  • Sign Out of Accounts, Disconnect Devices, and Erase Your Hard Drive

     After you save your personal information,

  • Sign out of all your online accounts from the computer.

  • Unpair your computer from Bluetooth devices like a mouse, keyboard, or wireless display.

  • Delete your browsing history

  • Uninstall your programs.

  • Erase your computer’s hard drive.

 

Safely Dispose of Your Computer

After you  saved your personal information and wiped your hard drive clean you  can get rid of the computer


Post a Comment

0 Comments