Advanced Cyber Security

Resources / IT Security Technical Part2 /

Top 10 IT Security Tips

IT security is now a critical part of computer usage, especially in the advent of the worldwide web.

With new security threats appearing daily, it's only natural for IT experts to develop ten fundamental guidelines that will help many an average computer user to avoid the common pitfalls of modern-day computing.

Get an Anti-Virus and Regularly Update It

Anti-viruses are your foremost line of defense against viruses and other types of malware.
Updating your anti-virus is a must because new
viruses come out of the Internet on an almost everyday basis.

Acquire an Anti-Spyware Tool

Anti-spyware services can be obtained via standalone programs like Lavasoft's Ad Aware or as a bundle to a whole IT security suite like the ZoneAlarm Pro Firewall package.

Keep Your Programs Updated

Hackers are forever looking for ways to infiltrate networks or systems via applications connected directly to the Internet.

Ergo, getting the latest patches and fixes is only par for the course.

Do Not Download Unknown Files

Do not get files or install programs without knowing where they came from first.

Be very careful of what you download from the Internet.

Do Not Open Unsolicited Emails

Email messages and attachments have become popular mediums that hackers use to spread their trojans, spyware, and botnets.

Create Complex Passwords and Change Them Regularly

Don't use birthdays or "123456" as your passwords.

Make hard-to-guess ones and modify them from time to time.

Utilize File Sharing Cautiously

File sharing services and applications are among the many channels that cyber terrorists exploit in order to spread chaos and mayhem across the Information Superhighway.

Run Services as Needed

Running too many network services (FTP, IIS, UPNP, and so on) at once will leave your machine vulnerable to all sorts of hacker attacks and machinations.

Install a Firewall

A firewall program is the best way for the average user to protect his PC even when he's online and open to all sorts of virtual assaults.

It filters out unauthorized and dangerous traffic from entering your system.

Make Regular Backups

The complete deletion of your files and programs because you were forced to reformat your compromised, malfunctioning, or virus-infected hard disk can be very devastating.

Regular backup is the best way to prepare for such a circumstance.

Vulnerability Scanner - Vulnerability Management

➤ Related pages
Anti Denial of Service Tips & Tricks
Anti Phishing Tips & Trick
Anti Social Engineering Tips & Tricks
Anti Spam Tips & Tricks
Anti Spyware Tips and Tricks
Anti Virus Tips & Trick
Better WiFi Range
Protect Against Client Wireless
Risks of Cyber Crime
SecPoint Free Security Scan
Security Mailinglist Rss Feeds
Top 10 Hacker Attacks
Top 10 Hackers
Top 10 IT Security Tips
Top 10 IT Security Tools
Top 10 Myths in IT Security
Top 10 Phishing Scams
Top 10 Secure Operating Systems
Top 10 Social Engineering Tactics
Top 10 Spam Attacks
Top 10 Spyware
Top 10 Viruses
Top 10 Ways to Protect
Top 10 Website Security Myths
Top 10 Worms