The Advisory Level Assures Your Computer Security Basics

Computer security basics is the second part of the article, 'Computer Protection Guide'. It is termed 'The Advisory Level' and provides protection against the less dangerous risks not covered in The Critical Level.

Although 'Advisory', you are strongly advised to install protection against the risks we'll discuss, as, otherwise, they will compromise your system.

The benefit of having this protection is that it will add depth and resilience to the Critical Level for your security and privacy.


For instance, the home and home office should consider the most secure browser in this level, because it is less open to viruses, spyware and other vulnerabilities. In this way, a secure browser adds support to the antivirus and spyware removers discussed in The Critical Level and is known as 'security layering'.

My advice... the peace of mind you will have from covering off these potential threats will far outweigh the relatively low investment involved.

In the Advisory Level, we'll be covering the following computer security basics to guard privacy and online security...

  1. Keeping Out Spam
  2. Secure Browsing
  3. Child Internet Security
  4. Passwords
  5. Popup Blocking
  6. Cookie Management


I. Keep Spam Out Of Our Inbox

By opening spam mail, we may inadvertently trigger viruses, worms or other malicious code. So, it's advisable to install a spam filter to reduce these risks... and the time we spend in sorting out genuine mail from spam.

If we check email at our provider's mail server by using web mail, then opening spam doesn't pose a risk to our computers, as it is not downloaded. Many email providers have very effective spam filters, so they do a good job of reducing what gets to our inbox. Even so, some spam gets through to our inboxes.

If, like me, you automatically download email to an email program, such as 'Outlook', this is where the trouble starts -- we can open spam inadvertently and trigger malware.

Discover the safe way to stop unwanted e-mails before they get to your computer by using Mailwasher Free Redirect...

At the click of a button, the program will open a pane showing your mail on your provider's server. You'll be able to see who the email is from, the subject, and the attachment. You can also preview the message to see what the sender has to say before downloading it to your computer. This will enable you to decide if you want to delete the email or keep it.

This free program absolutely removes the risk of triggering malware on our computers, as spam is deleted before it can reach our PCs.


II. Secure Browsing

Web browser security exploits often use JavaScript but also take advantage of many other vulnerabilities in browsers, such as hacking plugins and browser components. This may result in pop-ups, adware, viruses and spyware designed to extract online banking details and other personal information.

Researchers from Accuvant undertook a browser security comparison of Chrome, Firefox and Internet Explorer (IE) and pronounced Chrome as the most secure (Google, who own Chrome, commissioned the study). They identified that sandboxing, which isolates browser processes, objects and threads from each other, is a critical security tactic. One that is used by Chrome and IE -- but not Firefox.

However, NSS Labs consistently rates IE as better at detecting malware attacks. So...

Go for Chrome but if you have IE, then stay with it. If you use Safari, Firefox, Opera etc, then seriously consider changing to get another part of your computer security basics in place.


III. Child Internet Security

If you have kids, then they're a great source of malware introduction to your computer! By using chat programs, P2P, torrents etc, your PC is open to all the infections these programs can carry. You can minimize the risk by putting in place the Critical Level protection, as well as these computer security basics in the Advisory Level.

Consider restricting your child's computer habits and even monitoring where your child goes on the Internet. The most highly rated software to assist you with this is Net Nanny... find out how to keep your child safe on the Internet.


IV. Strengthen Your Passwords

The purpose of a password is to prevent anyone other than you from gaining access to your PC programs, client data and online banking etc.

There are many people out there who would love to get access to your confidential information or your online accounts. However, passwords will only keep outsiders out if they are difficult to guess!

Like me, it's probably impossible for you to remember all of your user names and passwords without writing them down. There's nothing wrong with this, providing no-one else can get at them.

However, with computer security basics in mind, I've been using a program called Roboform, which, not only stores my passwords in an encrypted form and enters them automatically when I go to a page requiring login data, but also generates secure passwords as I need a new login. Using such a program means only having to remember one password to gain access to all my other passwords... and no passwords written down to be accessed by someone-else!

Why don't you download a FREE TRIAL OF ROBOFORM and see for yourself!


V. Faster Page Loading With Popup Blocking

Blocking banners, pop-ups and pop-unders not only removes some potential risks to your Internet privacy and security, but also allows your pages to load faster, so speeding up your Internet surfing.

My advice is... don't waste your money on commercial software specifically for banner and popup blockers. Your browser and security suite will allow you to block this nuisance-ware, covering off for free another one of the computer security basics precautions.


VI. Cookies... Friend or Foe?

The use of cookies is generally harmless and can enhance our surfing experience. However, tracking cookies will monitor our online habits and enable the creation of a profile without our realizing it.

There's no need to spend money on a stand-alone cookie manager. There are effective tracking cookie tools in our browser and security suite.


GO BACK FROM COMPUTER SECURITY BASICS TO CRITICAL LEVEL

GO TO THE PERSONAL LEVEL




SEARCH GUARD PRIVACY HERE


Supporting Articles

  1. Computer Protection Guide... The Critical Level
  2. Computer Protection Guide... The Personal Level
  3. Know These Computer Security Threats For Internet Protection
  4. Check These Guidelines Before Buying Protection

  5. New! Comments

    Have your say about what you just read! Leave me a comment in the box below.